Edge Network Security Risk Control Based on Attack and Defense Map.
Lin ShiZilong WangYixuan ZengPublished in: J. Circuits Syst. Comput. (2021)
Keyphrases
- network security
- risk assessment
- dos attacks
- network intrusion
- intrusion detection
- security risks
- computer networks
- intrusion detection system
- denial of service
- network attacks
- traffic analysis
- network traffic
- information security
- anomaly detection
- security breaches
- countermeasures
- denial of service attacks
- ip networks
- computer security
- security policies
- control system
- security protection
- situation assessment
- network administrators
- packet filtering
- smart grid
- misuse detection
- real time
- risk management
- network intrusion detection
- monitoring system
- mobile agents
- end hosts
- model selection
- information technology