An attack-norm separation approach for detecting cyber attacks.
Nong YeToni FarleyDeepak LakshminarasimhanPublished in: Inf. Syst. Frontiers (2006)
Keyphrases
- cyber attacks
- cyber security
- countermeasures
- attack detection
- security policies
- intrusion detection system
- cyber crime
- dos attacks
- privacy issues
- intrusion detection
- computer systems
- critical infrastructure
- smart grid
- real time
- network security
- information security
- anomaly detection
- low cost
- decision making
- social networks