Login / Signup
On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy.
Fadi Mohsen
Usman Rauf
Victor Lavric
Alexander Kokushkin
Zhiyuan Wei
Adalynn Martinez
Published in:
IEEE Access (2024)
Keyphrases
</>
security policies
access control
security management
network security
network management
security concerns
distributed systems
databases
search algorithm
security requirements
security architecture
home network
intrusion detection
event logs
unauthorized access