作者: Tarfa Hamed , Jason B. Ernst , Stefan C. Kremer
DOI: 10.1007/978-3-319-58424-9_7
关键词:
摘要: … because it depends on comparing to known signatures) [51]. … We listed and explained the extracted features from the pre-… Signature-based anomaly intrusion detection using integrated …