Issue No.01 - Jan.-Feb. (2013 vol.15)
Char Sample , Capitol College
Kim Schaffer , Capitol College
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2013.7
Security automation continues to depend on signature models, but vulnerability exploitation is exceeding the abilities of such models. The authors, in reviewing the different types of mathematical-based constructs in anomaly detection, reveal how anomaly detection can enhance network security by potentially solving problems that signature models can't address.
information technology, network security, anomaly detection
Char Sample, Kim Schaffer, "An Overview of Anomaly Detection", IT Professional, vol.15, no. 1, pp. 8-11, Jan.-Feb. 2013, doi:10.1109/MITP.2013.7