Which intrusion detection technique monitors user behavior and detects deviations from normal patterns?
Signature-based detection
Heuristic-based detection
Anomaly-based detection

Operating Systems Exercises are loading ...