Login / Signup

A novel network security algorithm based on private key encryption.

Ahmad AbusukhonMohammad Talib
Published in: CyberSec (2012)
Keyphrases
  • network security
  • real time
  • anomaly detection
  • computer networks
  • databases
  • expectation maximization
  • public key
  • digital signature