Browsing by Subject "Back propagation networks"
Now showing items 1-1 of 1
(Izmir Institute of Technology, 2005)Misuse Intrusion Detection Systems are rule-based systems that search attack patterns in the data source. Detection ability of misuse detectors is limited to known attack patterns; hence unknown attacks may be missed. In ...