LEADER 02426nam 2200601 a 450 001 9910806991803321 005 20240516085449.0 010 $a1-283-14819-6 010 $a9786613148193 010 $a1-84816-448-3 035 $a(CKB)2550000000041068 035 $a(EBL)737642 035 $a(OCoLC)742333500 035 $a(SSID)ssj0000637169 035 $a(PQKBManifestationID)12207658 035 $a(PQKBTitleCode)TC0000637169 035 $a(PQKBWorkID)10683030 035 $a(PQKB)10963080 035 $a(MiAaPQ)EBC737642 035 $a(WSP)0000p666 035 $a(Au-PeEL)EBL737642 035 $a(CaPaEBR)ebr10479978 035 $a(CaONFJC)MIL314819 035 $a(EXLCZ)992550000000041068 100 $a20110712d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIntrusion detection $ea machine learning approach /$fZhenwei Yu, Jeffrey J.P. Tsai 205 $a1st ed. 210 $aLondon $cImperial College Press ;$aHackensack, N.J. $cDistributed by World Scientific Pub. Co., Pte., Ltd.$d2011 215 $a1 online resource (185 p.) 225 1 $aSeries in electrical and computer engineering ;$vv. 3 300 $aDescription based upon print version of record. 311 $a1-84816-447-5 320 $aIncludes bibliographical references and index. 327 $apt. A. Intrusion detection for wired network -- pt. B. Intrusion detection for wireless sensor network. 330 $aThis important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included. 410 0$aSeries in electrical and computer engineering ;$vv. 3. 606 $aComputer networks$xSecurity measures 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aTsai$b Jeffrey J.-P$01602137 701 $aYu$b Zhenwei$01602138 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910806991803321 996 $aIntrusion detection$93926004 997 $aUNINA