Network traffic anomaly detection and prevention concepts, techniques, and tools
This indispensable text/reference presents a comprehensive overview on the detection and prevention of anomalies in computer network traffic, from coverage of the fundamental theoretical concepts to in-depth analysis of systems and methods. Readers will benefit from invaluable practical guidance on...
Saved in:
| Main Authors: | Bhuyan, Monowar H. (Author), Bhattacharyya, Dhruba K. (Author), Kalita, Jugal Kumar (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Cham, Switzerland
Springer
2017
|
| Series: | Computer communications and networks
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Handbook of research on intrusion detection systems
Published: (2020)
Published: (2020)
Managing security with Snort and IDS tools
by: Cox, Kerry
Published: (2004)
by: Cox, Kerry
Published: (2004)
Fundamentals of Data Science : Theory and Practice /
by: Kalita, Jugal Kumar, et al.
Published: (2024)
by: Kalita, Jugal Kumar, et al.
Published: (2024)
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
Published: (2013)
Published: (2013)
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)
by: Masud, Mehedy
Published: (2012)
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
Engineering condition monitoring practice, methods and applications
Published: (1996)
Published: (1996)
Condition monitoring engineering the practice
Published: (2002)
Published: (2002)
Preventive maintenance / essential care and condition monitoring.
Published: (1998)
Published: (1998)
Condition monitoring of mechanical and hydraulic plant a concise introduction and guide
by: Hunt, Trevor M.
Published: (1996)
by: Hunt, Trevor M.
Published: (1996)
Environmental sensing
Published: (2016)
Published: (2016)
Applied cloud deep semantic recognition advanced anomaly detection
Published: (2018)
Published: (2018)
Bucholz and the Detectives
by: Pinkerton, Allan, 1819-1884
Published: (2007)
by: Pinkerton, Allan, 1819-1884
Published: (2007)
Detecting and classifying low probability of intercept radar
by: Pace, Phillip E.
Published: (2009)
by: Pace, Phillip E.
Published: (2009)
Essential guide to object monitors
by: Boucher. Karen
Published: (1999)
by: Boucher. Karen
Published: (1999)
Structural health monitoring of civil infrastructure systems
Published: (2009)
Published: (2009)
Postconflict elections,democratization and international assitance
by: lh
by: lh
Road traffic injury prevention training manual
Published: (2006)
Published: (2006)
Data Warehouse and Data Mining : Concepts, techniques and real life applications /
by: Kumar, Jugnesh
Published: (2024)
by: Kumar, Jugnesh
Published: (2024)
Data mining concepts and techniques
by: Han, Jiawei
Published: (2012)
by: Han, Jiawei
Published: (2012)
Data mining concepts and techniques
by: Han, Jiawei, et al.
Published: (2023)
by: Han, Jiawei, et al.
Published: (2023)
Oscar the Detective; Or, Dudie Dunne, The Exquisite Detective
by: Old Sleuth, 1839?-1898
Published: (2006)
by: Old Sleuth, 1839?-1898
Published: (2006)
Anomali
by: Syafiq Aizat
Published: (2022)
by: Syafiq Aizat
Published: (2022)
ANOMALI
Anomalis
Coast lines how mapmakers frame the world and chart environmental change
by: Monmonier, Mark S.
Published: (2008)
by: Monmonier, Mark S.
Published: (2008)
Anderson Crow, Detective
by: McCutcheon, George Barr, 1866-1928
Published: (2009)
by: McCutcheon, George Barr, 1866-1928
Published: (2009)
Malcolm Sage, Detective
by: Jenkins, Herbert George, 1876-1923
Published: (2009)
by: Jenkins, Herbert George, 1876-1923
Published: (2009)
Cleek, the Master Detective
by: Hanshew, Thomas W., 1857-1914
Published: (2009)
by: Hanshew, Thomas W., 1857-1914
Published: (2009)
Introduction to Data Science : A Python Approach to Concepts, Techniques and Applications /
by: Igual, Laura
Published: (2024)
by: Igual, Laura
Published: (2024)
Madeline Payne, the Detective's Daughter
by: Lynch, Lawrence L.
Published: (2008)
by: Lynch, Lawrence L.
Published: (2008)
Dave Porter in the Gold Fields; Or, The Search for the Landslide Mine
by: Stratemeyer, Edward, 1862-1930
Published: (2007)
by: Stratemeyer, Edward, 1862-1930
Published: (2007)
Text mining and visualization case studies using open-source tools
Published: (2016)
Published: (2016)
Heart rate training increase endurance, raise lactate threshold, and boost power
by: Benson, Roy
Published: (2011)
by: Benson, Roy
Published: (2011)
Pluto and Charon ice worlds on the ragged edge of the solar system
by: Stern, Alan 1957-
Published: (1998)
by: Stern, Alan 1957-
Published: (1998)
Pollution and biomonitoring
Published: (1995)
Published: (1995)
The Burglar's Fate, and The Detectives
by: Pinkerton, Allan, 1819-1884
Published: (2006)
by: Pinkerton, Allan, 1819-1884
Published: (2006)
Basic mathematics and computer techniques for coal preparation and mining
Published: (1983)
Published: (1983)
The Spiritualists and the Detectives
by: Pinkerton, Allan, 1819-1884
Published: (2010)
by: Pinkerton, Allan, 1819-1884
Published: (2010)
SUSTAINABILITY FRAMEWORK FOR THE MALAYSIAN DEFENCE INDUSTRY TOWARDS ACHIEVING PRINCIPLE OF SELF-RELIANCE /
by: Erresafrinal Abdullah
Published: (2024)
by: Erresafrinal Abdullah
Published: (2024)
Similar Items
-
Handbook of research on intrusion detection systems
Published: (2020) -
Managing security with Snort and IDS tools
by: Cox, Kerry
Published: (2004) -
Fundamentals of Data Science : Theory and Practice /
by: Kalita, Jugal Kumar, et al.
Published: (2024) -
Network intrusion analysis methodologies, tools, and techniques for incident analysis and response
Published: (2013) -
Data mining tools for malware detection
by: Masud, Mehedy
Published: (2012)


