|
|
|
Edward Guillen, Jeisson Sánchez and Rafael Paez
A wide range of IDS implementations with anomaly detection modules have been deployed. In general, those modules depend on intrusion knowledge databases, such as Knowledge Discovery Dataset (KDD99), Center for Applied Internet Data Analysis (CAIDA) or Co...
ver más
|
|
|