Toward On-chip Network Security Using Runtime Isolation Mapping.
Mohammad Sadegh SadeghiSiavash Bayat SarmadiShaahin HessabiPublished in: ACM Trans. Archit. Code Optim. (2019)
Keyphrases
- network security
- computer networks
- intrusion detection
- intrusion detection system
- traffic analysis
- network traffic
- risk assessment
- security policies
- dos attacks
- information security
- computer security
- network intrusion
- anomaly detection
- security protection
- anti phishing
- situation assessment
- network administrators
- security breaches
- network attacks
- ip networks
- denial of service
- data mining
- maximum likelihood
- network intrusion detection
- information systems