Sign in

A Deployment Value Model for Intrusion Detection Sensors.

Siraj A. ShaikhHoward ChiversPhilip NoblesJohn A. ClarkHao Chen
Published in: ISA (2009)
Keyphrases
  • intrusion detection
  • anomaly detection
  • intrusion detection system
  • network traffic
  • reinforcement learning
  • object recognition
  • information security
  • network security