搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Prajkta P. Chapke , Rupali R. Deshmukh
DOI: 10.1145/2743065.2743128
关键词:
摘要: … It is also known as anomaly detection or detection by behavior… A signature based IDS will monitor packets on the network … a database of signatures or attributes from known malicious …
The Journal of Supercomputing,2017, 引用: 39
OcRI,2016, 引用: 1
,2016, 引用: 0
Applied Soft Computing,2020, 引用: 77