Tables index

From

Big Data in Intrusion Detection Systems and Intrusion Prevention Systems

Lidong Wang

Journal of Computer Networks. 2017, 4(1), 48-55 doi:10.12691/jcn-4-1-5
  • Table 1. The Classification of Intrusion Detection Systems
  • Table 2. Mapping of Various Attacks with Anomalies
  • Table 3. Comparison of ID/PS Methods and Features
  • Table 4. Methods of Network Anomaly Detection