Keyphrases
Anomaly Detection
33%
Call Data
33%
Column Vectors
33%
Command Sequence
33%
Computational Expense
33%
Computational Implementation
33%
Computer Security
100%
Data Vector
33%
Detection Accuracy
33%
High Efficiency
33%
High-dimensional Data
33%
Individual Systems
33%
Intrusion Detection
33%
Intrusion Detection System
100%
Low Overhead
33%
Network Security Framework
33%
Principal Coordinate Analysis (PCoA)
100%
Real-time Intrusion Detection
33%
Sequence Data
33%
System Call
66%
Computer Science
Anomaly Detection
25%
Command Sequence
25%
Computer Security
100%
Detection Accuracy
25%
Detection Method
100%
Experimental Result
25%
High Dimensional Data
25%
Individual System
25%
Information Source
25%
Intrusion Detection
100%
Network Security
25%
Principle Component Analysis
100%
Security Framework
25%
System Calls
50%