Keyphrases
User Behavior
100%
Non-negative Matrix Factorization
100%
Anomaly Intrusion Detection
100%
Program Behavior
100%
Audit Data
50%
System Call
50%
Fixed-length
16%
Computer System
16%
Effective Approach
16%
Detection Accuracy
16%
Experiment Results
16%
Computational Expense
16%
Normal Behavior
16%
Research Laboratories
16%
Model-based Method
16%
Individual Systems
16%
Computational Implementation
16%
Call Data
16%
New Mexico
16%
Unix
16%
Data Matrix
16%
Real-time Intrusion Detection
16%
Computer Science
Intrusion Detection
100%
nonnegative matrix factorization
100%
User Behavior
100%
System Calls
50%
Normal Program
33%
Data Stream
16%
Detection Accuracy
16%
Normal Behavior
16%
Individual System
16%
Matrix Factorization
16%
Effective Approach
16%
Computer System
16%
Information Source
16%