Identifying Requirements for Network Security Software.
Darryl A. WhiteGhasem S. AlijaniPublished in: Security and Management (2003)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- security policies
- information security
- dos attacks
- situation assessment
- network traffic
- security protection
- software development
- computer security
- security risks
- network intrusion
- security breaches
- anti phishing
- risk assessment
- computer systems
- active learning
- real world
- denial of service
- training data
- data mining
- packet filtering
- databases