Towards a Hacker Attack Representation Method.
Péter KárpátiGuttorm SindreAndreas L. OpdahlPublished in: ICSOFT (2) (2010)
Keyphrases
- classification method
- experimental evaluation
- detection method
- cost function
- optimization method
- data sets
- fully automatic
- synthetic data
- clustering method
- dynamic programming
- multiscale
- significant improvement
- pairwise
- computational cost
- classification accuracy
- computationally efficient
- preprocessing
- objective function
- face recognition
- high precision
- decision trees
- feature selection