Login / Signup
Evaluating and selecting the biometrics in network security.
Che-Hung Liu
Jen-Sheng Wang
Chih-Chiang Peng
Joseph Z. Shyu
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
network security
computer networks
intrusion detection
traffic analysis
dos attacks
network traffic
anomaly detection
intrusion detection system
security policies
risk assessment
computer security
information security
situation assessment
security breaches
denial of service
security protection
anti phishing
ip networks
cyber security
network intrusion
network administrators
pattern recognition
packet filtering
network monitoring
network intrusion detection
wired networks
data processing
information systems