Intrusion Detection Models Based on Data Mining

Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental techniq...

Full description

Bibliographic Details
Main Authors: Guojun Mao, Xindong Wu, Xuxian Jiang
Format: Article
Language:English
Published: Springer 2012-02-01
Series:International Journal of Computational Intelligence Systems
Subjects:
Online Access:https://www.atlantis-press.com/article/25867956.pdf

Similar Items