Effective network security monitoring: from attribution to target-centric monitoring.
Siraj Ahmed ShaikhHarsha Kumara KalutaragePublished in: Telecommun. Syst. (2016)
Keyphrases
- network security
- monitoring system
- intrusion detection
- network monitoring
- situation assessment
- real time
- computer networks
- intrusion detection system
- traffic analysis
- computer security
- wireless sensor
- network traffic
- streaming data
- packet filtering
- network administrators
- situational awareness
- risk assessment
- information security
- anomaly detection
- supervised learning