Anomaly-based intrusion detection system

Results: 13



#Item
11Immune system / Partition function / Anomaly detection / Process / Science / Computing / Management / Multi-agent systems / Intrusion detection system / Agent-based model

LNCS[removed]An Ecological Approach to Anomaly Detection: The EIA Model

Add to Reading List

Source URL: ccl.northwestern.edu

Language: English - Date: 2013-03-28 17:03:17
12Benchmark / Algorithm / Mathematics / Data mining / Anomaly / Intrusion detection system

AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection Shashank Shanbhag and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA {sshanbha,wolf}@ecs.uma

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:27
13Computer security / Intrusion detection system / Information Assurance Technology Analysis Center / Network intrusion detection system / Intrusion prevention system / Snort / Host-based intrusion detection system / Anomaly detection / Sourcefire / Computer network security / System software / Software

Tools Information Assurance Tools Report Sixth Edition

Add to Reading List

Source URL: iac.dtic.mil

Language: English - Date: 2009-12-28 13:31:36
UPDATE