Login / Signup
Data flow analysis for anomaly detection and identification toward resiliency in extreme scale systems.
Byoung Uk Kim
Published in:
J. Supercomput. (2012)
Keyphrases
</>
anomaly detection
data sets
data analysis
flow analysis
detect anomalies
intrusion detection
data processing
computer systems
pattern recognition
data mining applications
network intrusion
network intrusion detection
knowledge discovery
data points
data sources
training data
information systems
social networks