|
Volumn 3, Issue , 2010, Pages
|
A rule generation model using S-PSO for Misuse Intrusion Detection
|
Author keywords
Feature selection; Intrusion Detection; Misuse Detection; Particle swarm optimization; Rule generation
|
Indexed keywords
ATTACK SIGNATURE;
CLASSIFICATION RATES;
COMPUTER SECURITY;
DETECTION RATES;
FALSE POSITIVE RATES;
FEATURE SELECTION;
HUMAN ANALYSIS;
INTRUSION DETECTION SYSTEMS;
MALICIOUS BEHAVIOR;
MISUSE DETECTION;
NETWORK SYSTEMS;
PARTICLE SWARM;
RULE GENERATION;
RULE OPTIMIZATION;
STATISTICAL APPROACH;
COMPUTER CRIME;
FEATURE EXTRACTION;
NETWORK SECURITY;
PARTICLE SWARM OPTIMIZATION (PSO);
INTRUSION DETECTION;
|
EID: 78649571887
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICCASM.2010.5620540 Document Type: Conference Paper |
Times cited : (11)
|
References (10)
|