<--- Back to Details
First PageDocument Content
Data mining / Intrusion detection system / Anomaly / Recall / Denial-of-service attack / Mind / Computing / Information technology management / Computer network security / Data security / Anomaly detection
Date: 2001-03-23 12:19:38
Data mining
Intrusion detection system
Anomaly
Recall
Denial-of-service attack
Mind
Computing
Information technology management
Computer network security
Data security
Anomaly detection

SECOND IEEE-SMC INFORMATION ASSURANCE WORKSHOP, WEST POINT, NEW YORK, JUNE 5-6, [removed]Event Recognition Beyond Signature and Anomaly Jon Doyle, Isaac Kohane, William Long, Howard Shrobe, and Peter Szolovits

Add to Reading List

Source URL: groups.csail.mit.edu

Download Document from Source Website

File Size: 107,87 KB

Share Document on Facebook

Similar Documents

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

DocID: 1vnc7 - View Document

ALERT LOGIC THREAT MANAGER ® ™  NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

DocID: 1vcD9 - View Document

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

DocID: 1tcvt - View Document

Intrusion	Detection	System	Installation Installation	(Already	completed)	 	 apt-get	update	&&	apt-get	install	libpcre3	libpcre3-dbg	build-essential	autoconf	automake

Intrusion Detection System Installation Installation (Already completed) apt-get update && apt-get install libpcre3 libpcre3-dbg build-essential autoconf automake

DocID: 1t8jc - View Document

Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

DocID: 1sGK3 - View Document