Skip to main navigation
Skip to search
Skip to main content
Arizona State University Home
Home
Profiles
Departments and Centers
Scholarly Works
Activities
Equipment
Grants
Datasets
Prizes
Search by expertise, name or affiliation
Mining normal and intrusive activity patterns for computer intrusion detection
Xiangyang Li,
Nong Ye
Industrial, Systems and Operations Engineering
Research output
:
Contribution to journal
›
Article
›
peer-review
1
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Mining normal and intrusive activity patterns for computer intrusion detection'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Mathematics
Intrusion Detection
100%
Mining
68%
Classification Algorithm
52%
Clustering Algorithm
48%
Computer Security
30%
Robustness
30%
Audit
27%
Redistribution
24%
Scalability
23%
Post-processing
22%
Grouping
20%
Machine Learning
20%
Large Set
19%
Outlier
17%
Clustering
17%
Learning
16%
Heuristics
15%
Grid
14%
Statistics
12%
Performance
10%
Engineering & Materials Science
Intrusion detection
55%
Set theory
14%
Security of data
10%
Clustering algorithms
9%
Scalability
8%
Statistics
8%
Machine learning
8%