Establish a scientific concept of network security and build a strong defense line of network security.
Changxiang ShenLei ZhangDavid M. PerryGuangyi LiuPublished in: CyberC (2020)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- network traffic
- information security
- intrusion detection system
- computer security
- dos attacks
- network intrusion
- security protection
- security policies
- risk assessment
- end hosts
- anomaly detection
- network administrators
- ip networks
- security breaches
- anti phishing
- cyber security
- object recognition
- situation assessment
- denial of service
- network monitoring
- network management
- packet filtering
- database systems
- databases