Continuous Verification of Network Security Compliance.
Claas LorenzVera ClemensMax SchrötterBettina SchnorPublished in: IEEE Trans. Netw. Serv. Manag. (2022)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- dos attacks
- network traffic
- security protection
- information security
- security policies
- risk assessment
- computer security
- ip networks
- situation assessment
- anti phishing
- denial of service
- end hosts
- mobile agents
- lightweight
- knowledge discovery
- network administrators
- security breaches
- database systems
- packet filtering
- feature selection
- real time