A Heuristic for Constructing Smaller Automata Based on Suffix Sorting and Its Application in Network Security.
Inbok LeeVictor C. ValgentiMin Sik KimSung-il OhPublished in: IEICE Trans. Inf. Syst. (2018)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- network traffic
- anomaly detection
- ip networks
- situation assessment
- dos attacks
- computer security
- security breaches
- security protection
- information security
- risk assessment
- network intrusion
- network administrators
- end hosts
- security policies
- network monitoring
- supervised learning