<--- Back to Details
First PageDocument Content
Cyberwarfare / AAFID / Data security / Intrusion detection system / Anomaly detection / Mobile agent / Software agent / Bro / Network intrusion detection system / Computer security / Computer network security / Computing
Date: 2012-11-09 09:38:16
Cyberwarfare
AAFID
Data security
Intrusion detection system
Anomaly detection
Mobile agent
Software agent
Bro
Network intrusion detection system
Computer security
Computer network security
Computing

NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 494,74 KB

Share Document on Facebook

Similar Documents

Dimension reduction / Principal component analysis / Anomaly

Poster: PCA-based statistical anomaly detection of reactive jamming in WiFi networks Ni An Vinod Mishra

DocID: 1xTRV - View Document

Machine learning / Artificial neural networks / Learning / Artificial intelligence / Applied mathematics / Unsupervised learning / Anomaly detection / Data mining / Data security / Anomaly / Autoencoder / Feature learning

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

DocID: 1xTRg - View Document

Technology / Information and communications technology / Computing / Machine learning / Anomaly detection / Data mining / Data security / Mobile telecommunications / Smartphone / Mobile phone / Anomaly

Anomaly detection based on real-time exploitation of billing systems

DocID: 1xTmR - View Document

Anomaly Detection in Hyperspectral Images of Complex Scenes Dirk BORGHYS a,1 , Elie TRUYEN a Michal SHIMONI a and Christiaan PERNEEL b a Royal Military Academy, Signal & Image Centre, Brussels, Belgium b Royal Military A

DocID: 1vnK6 - View Document

An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

DocID: 1vlla - View Document