Amanote Research
Register
Sign In
A Dubiety-Determining Based Model for Database Cumulated Anomaly Intrusion
doi 10.4108/infoscale.2007.220
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2007
Authors
Gang Lu
Junkai Yi
Kevin Lü
Publisher
ICST
Related search
Anomaly-Based Intrusion Detection
Advances in Information Security, Privacy, and Ethics
A Review of Anomaly Based Intrusion Detection Systems
International Journal of Computer Applications
Anomaly Based Intrusion Detection Using Modified Fuzzy Clustering
International Journal of Interactive Multimedia and Artificial Intelligence
LDFGB Algorithm for Anomaly Intrusion Detection
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks
Anomaly Based Intrusion Detection by Heuristics to Predict Intrusion Scope of IOT Network Transactions
International Journal of Engineering and Technology(UAE)
Architecture
Hardware
Engineering
Chemical Engineering
Biotechnology
Environmental Engineering
Computer Science
Anomaly-Based Network Intrusion Detection Using Wavelets and Adversarial Autoencoders
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Personal Anomaly-Based Intrusion Detection Smart Card Using Behavioural Analysis
IFIP International Federation for Information Processing
Some Clustering-Based Methodology Applications to Anomaly Intrusion Detection Systems
International Journal of Security and its Applications
Computer Science