![]() |
Volumn 2, Issue , 2005, Pages 159-162
|
Apply data mining to defense-in-depth network security system
|
Author keywords
Data Mining; Defense in depth; IDS; IPS; Network Security
|
Indexed keywords
COMPUTER ARCHITECTURE;
COMPUTER CRIME;
FAULT TOLERANT COMPUTER SYSTEMS;
SECURITY OF DATA;
SIGNAL DETECTION;
DEFENSE-IN-DEPTH;
IDS;
IPS;
NETWORK SECURITY;
DATA MINING;
|
EID: 33744479744
PISSN: 1550445X
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/AINA.2005.118 Document Type: Conference Paper |
Times cited : (13)
|
References (17)
|