Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security.
Charles McGuffeyChen LiuStephanie SchuckersPublished in: J. Comput. Inf. Technol. (2015)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- security policies
- anomaly detection
- network traffic
- security breaches
- risk assessment
- security protection
- information security
- dos attacks
- network administrators
- network access
- ip networks
- anti phishing
- hardware implementation
- real time
- distributed systems