Read our cookies policy and privacy statement for more information.
×Cookeville, Tennessee
Traditional intrusion and anomaly detection systems, as well as current advances in this ever-growing field. The application of anomaly detection to a wide-range of domains, including fraud, insider threats, and time-series data will be investigated in-depth, as well as network attacks and the systems for detecting oddities such as network intrusions and denial of service attacks. This course will not only cover the subjects through readings, but also through hands-on experience.
Units: 3.0
Hours: Lec. 3.