An innovative network security vulnerability modeling method and tool.
Xiangqun QiuRob PatersonPublished in: IEEE Commun. Mag. (2010)
Keyphrases
- network security
- modeling method
- risk assessment
- intrusion detection
- intrusion detection system
- computer networks
- denial of service
- traffic analysis
- dos attacks
- security protection
- security policies
- security risks
- network traffic
- fuzzy neural network
- security breaches
- anti phishing
- information security
- anomaly detection
- network monitoring
- network administrators
- real time
- rough sets
- information systems
- neural network
- databases