![]() |
Volumn , Issue , 2012, Pages 253-260
|
On network intrusion detection for deployment in the wild
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ANOMALY-BASED INTRUSION DETECTION;
CHANGING ENVIRONMENT;
DETECTING ATTACKS;
DETECTION SCHEME;
DETECTION SYSTEM;
EMBEDDED PLATFORMS;
EXISTING SYSTEMS;
INTRUSION DETECTION SCHEME;
MANAGEMENT COMPLEXITY;
MANAGEMENT TASKS;
NETWORK INTRUSION DETECTION;
NETWORK OPERATIONS;
NETWORK-BASED ATTACKS;
NETWORKED SYSTEMS;
PLUG-AND-PLAY;
PROCESSING SPEED;
REAL-TIME TRAINING;
RELIABLE OPERATION;
SECURITY FEATURES;
SECURITY MEASURE;
STAND-ALONE DEVICES;
TRAINING DATA SETS;
INTRUSION DETECTION;
COMPUTER CRIME;
|
EID: 84864247466
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/NOMS.2012.6211906 Document Type: Conference Paper |
Times cited : (9)
|
References (19)
|