<--- Back to Details
First PageDocument Content
Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare
Date: 1999-11-05 00:00:00
Antivirus software
Intrusion detection system
Computing
Threat
Immune system
Computer virus
Artificial intelligence
AAFID
Anomaly-based intrusion detection system
Computer security
Computer network security
Cyberwarfare

Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 83,18 KB

Share Document on Facebook

Similar Documents

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

DocID: 11S4q - View Document

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

DocID: 11fWL - View Document

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

DocID: ZIbl - View Document

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

DocID: YOuu - View Document

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

DocID: RK8t - View Document