Fortification Through Topological Dominance: Using Hop Distance and Randomized Topology Strategies to Enhance Network Security.
Paul HydenIra S. MoskowitzStephen RussellPublished in: AAAI Spring Symposia (2016)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- anomaly detection
- network traffic
- dos attacks
- information security
- security policies
- security breaches
- ip networks
- risk assessment
- persistent homology
- situation assessment
- network intrusion
- network administrators
- security protection
- denial of service
- network attacks
- unsupervised learning
- information technology
- decision making
- information systems