This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
An Overview of Anomaly Detection
Jan.-Feb. 2013 (vol. 15 no. 1)
pp. 8-11
Char Sample, Capitol College
Kim Schaffer, Capitol College
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address.
Index Terms:
information technology,network security,anomaly detection
Citation:
Char Sample, Kim Schaffer, "An Overview of Anomaly Detection," IT Professional, vol. 15, no. 1, pp. 8-11, Jan.-Feb. 2013, doi:10.1109/MITP.2013.7
Usage of this product signifies your acceptance of the Terms of Use.