Читать книгу Intelligent Network Management and Control - Badr Benmammar - Страница 17

1.3.2. Techniques based on data exploration

Оглавление

Data exploration aims to eliminate the manual elements used for the design of intrusion detection systems. Various data exploration techniques have been developed and widely used. The main data exploration techniques are presented in the following sections.

Intelligent Network Management and Control

Подняться наверх