Interoperable Defensive Strategies of Network Security Evaluation.
Ala Abdulsalam AlaroodAhmed Omar AlzahraniPublished in: IEEE Access (2024)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- network traffic
- information security
- dos attacks
- risk assessment
- security protection
- security policies
- network intrusion
- situation assessment
- anti phishing
- ip networks
- anomaly detection
- data processing
- active learning
- computer systems
- computer security
- network administrators
- end hosts
- data fusion
- metadata
- denial of service
- feature selection
- wired networks
- packet filtering
- data mining
- real world