45
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Anomaly-based network intrusion detection: Techniques, systems and challenges

      , , ,

      Computers & Security

      Elsevier BV

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references 14

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Fast Effective Rule Induction

           William Cohen (1995)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An Intrusion-Detection Model

             D.E. Denning (1987)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The KDD process for extracting useful knowledge from volumes of data

                Bookmark

                Author and article information

                Journal
                Computers & Security
                Computers & Security
                Elsevier BV
                01674048
                February 2009
                February 2009
                : 28
                : 1-2
                : 18-28
                Article
                10.1016/j.cose.2008.08.003
                © 2009

                Comments

                Comment on this article