Amanote Research

Amanote Research

    RegisterSign In

The Techniques for Computer Security Intrusion Detection Based on Preserving Embedding for Anomaly Detection

doi 10.2991/mmebc-16.2016.126
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2016

Authors
Chunxia ZhaoLinjing WangFan Liao
Publisher

Atlantis Press


Related search

Anomaly-Based Intrusion Detection

Advances in Information Security, Privacy, and Ethics
2020English

LDFGB Algorithm for Anomaly Intrusion Detection

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Experiments on Adaptive Techniques for Host-Based Intrusion Detection

2001English

Construction Research of Computer Network System Security Based on Distributed Intrusion Detection Technology

Journal of Networks
2014English

Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining

2015English

A Review of Anomaly Based Intrusion Detection Systems

International Journal of Computer Applications
2011English

Anomaly Based Intrusion Detection Using Modified Fuzzy Clustering

International Journal of Interactive Multimedia and Artificial Intelligence
2017English

Design and Performance Analysis of Various Feature Selection Methods for Anomaly-Based Techniques in Intrusion Detection System

Security and Privacy
2019English

Anomaly Intrusion Detection Based on Hyper-Ellipsoid in the Kernel Feature Space

KSII Transactions on Internet and Information Systems
Computer NetworksInformation SystemsCommunications
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy