Statistical Control by Monitoring and Feedback Adjustment
Statistical Control by Monitoring and Feedback Adjustment
QoS-Centric Stateful Resource Management in Information Systems
Information Systems Frontiers
Attack profiles to derive data observations, features, and characteristics of cyber attacks
Information-Knowledge-Systems Management
Probabilistic techniques for intrusion detection based on computer audit data
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 4.10 |
Attack-norm separation uses rigorous signal detection models to isolate attack signals from normal data before attack identification. By drawing from science instead of heuristics, this approach promises more efficient, accurate, and inclusive attack identification.