Reference Hub19
Indices2
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

Copyright: © 2009 |Pages: 476
ISBN13: 9781599047089|ISBN10: 159904708X|EISBN13: 9781599047102|ISBN13 Softcover: 9781616925048
DOI: 10.4018/978-1-59904-708-9
Cite Book Cite Book

MLA

Wang , Yun . Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. IGI Global, 2009. https://doi.org/10.4018/978-1-59904-708-9

APA

Wang , Y. (2009). Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. IGI Global. https://doi.org/10.4018/978-1-59904-708-9

Chicago

Wang , Yun . Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-59904-708-9

Export Reference

Mendeley
Favorite Full-Book Download

Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.

Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection bridges between applied statistical modeling techniques and network security to provide statistical modeling and simulating approaches to address the needs for intrusion detection and protection. Covering in-depth topics such as network traffic data, anomaly intrusion detection, and prediction events, this authoritative source collects must-read research for network administrators, information and network security professionals, statistics and computer science learners, and researchers in related fields.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Foundations  (pages 14-14)
Foundations
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Data Mining and Modeling  (pages 123-123)
Data Mining and Modeling
This content has been removed at the discretion of the publisher and the editors.
Classifications, Profiles, and Making Better Decisions
This content has been removed at the discretion of the publisher and the editors.
Back Materials
About the Author
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.