<--- Back to Details
First PageDocument Content
Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing
Date: 2010-03-05 21:14:30
Computer security
Data mining
Statistics
Spamming
Anomaly detection
Intrusion detection system
Network intrusion detection system
Misuse detection
Snort
Computer network security
Data security
Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Download Document from Source Website

File Size: 158,47 KB

Share Document on Facebook

Similar Documents

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

Special Session Proposal for IEEE-CICS 2018 Topic: Computational Intelligence for Intrusion Detection Organizations across the world prefer to install Intrusion Detection System to protect their private network from exte

DocID: 1vnc7 - View Document

ALERT LOGIC THREAT MANAGER ® ™  NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

ALERT LOGIC THREAT MANAGER ® ™ NETWORK INTRUSION DETECTION SYSTEM (IDS) AND VULNERABILITY MANAGEMENT

DocID: 1vcD9 - View Document

Network Intrusion Detection Systems (NIDS) The Network Intrusion Detection System provides the capability for an agent or device to monitor network traffic, identify that traffic that has been identified as being poten

DocID: 1sGK3 - View Document

Microsoft Word - Call_CRC_gk

Microsoft Word - Call_CRC_gk

DocID: 1rqGb - View Document

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI 48109 {jonojono, emcooke, farnam}@

DocID: 1r1LA - View Document