Using Decision Tree Analysis for Intrusion Detection: A How-To Guide

As cyber threats grow in sophistication, network defenders need to use every tool in the defensive arsenal to protect their networks. Data mining techniques, such as decision tree analysis, offer a semi-automated approach to detect adversary threats. This paper presents a repeatable process to...
Jeff Markey
June 9, 2011

All papers are copyrighted. No re-posting of papers is permitted