Back to Results
First PageMeta Content
Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management


Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation
Add to Reading List

Document Date: 2006-01-26 18:38:00


Open Document

File Size: 688,66 KB

Share Result on Facebook
UPDATE