Explore
Intrusion Detection Systems
0 Ungluers have
Faved this Work
Login to Fave
The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 20 times via unglue.it ebook links.
- 20 - pdf (CC BY-NC-SA) at mts.intechopen.com.
Keywords
- Computer networking & communications
- Computing & information technology