Login / Signup
Distributing and Obfuscating Firewalls via Oblivious Bloom Filter Evaluation.
Ken Goss
Wei Jiang
Published in:
CoRR (2018)
Keyphrases
</>
bloom filter
evaluation process
artificial intelligence
data structure
real time
join processing
space efficient
neural network
training data
information systems
intrusion detection system
network security
evaluation method
gold standard
evaluation model
learning algorithm
machine learning
database