Evaluating and selecting the biometrics in network security.
Che-Hung LiuJen-Sheng WangChih-Chiang PengJoseph Z. ShyuPublished in: Secur. Commun. Networks (2015)
Keyphrases
- network security
- computer networks
- intrusion detection
- traffic analysis
- dos attacks
- network traffic
- anomaly detection
- intrusion detection system
- security policies
- risk assessment
- computer security
- information security
- situation assessment
- security breaches
- denial of service
- security protection
- anti phishing
- ip networks
- cyber security
- network intrusion
- network administrators
- pattern recognition
- packet filtering
- network monitoring
- network intrusion detection
- wired networks
- data processing
- information systems