|
Volumn , Issue , 2005, Pages 144-153
|
Evaluating pattern recognition techniques in intrusion detection systems
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ANOMALOUS ACTIVITY;
DATA SOURCE;
DESIGN AND OPERATIONS;
INTRUSION DETECTION SYSTEMS;
NETWORK TRAFFIC;
OPERATING SYSTEMS;
OPERATIONAL SCENARIO;
PATTERN RECOGNITION TECHNIQUES;
POTENTIAL ATTACK;
REAL-WORLD;
RESEARCH FIELDS;
COMPUTER CRIME;
COMPUTER OPERATING SYSTEMS;
INFORMATION SYSTEMS;
INTRUSION DETECTION;
PATTERN RECOGNITION SYSTEMS;
|
EID: 78650753809
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (29)
|
References (18)
|