Publication | Closed Access
An Overview of Anomaly Detection
16
Citations
4
References
2013
Year
Anomaly DetectionEngineeringInformation SecurityVerificationInformation ForensicsFormal VerificationHardware SecuritySecurity ModellingData ScienceData MiningPattern RecognitionSystems EngineeringVulnerability ExploitationSecurity AutomationIntrusion Detection SystemThreat DetectionOutlier DetectionKnowledge DiscoveryComputer ScienceSignal ProcessingData SecurityCryptographyIntrusion DetectionFormal MethodsNovelty DetectionSecurity Measurement
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address.
| Year | Citations | |
|---|---|---|
Page 1
Page 1