Feedback

X
Intrusion Detection Systems

Intrusion Detection Systems

0 Ungluers have Faved this Work
The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 20 times via unglue.it ebook links.
  1. 20 - pdf (CC BY-NC-SA) at mts.intechopen.com.

Keywords

  • Computer networking & communications
  • Computing & information technology

Links

DOI: 10.5772/593

Editions

edition cover

Share

Copy/paste this into your site: