Login / Signup
Specification Modeling and Validation Applied to a Family of Network Security Products.
Robert J. Hall
Published in:
ASE (2001)
Keyphrases
</>
network security
intrusion detection
computer networks
intrusion detection system
situation assessment
traffic analysis
ip networks
anomaly detection
network traffic
computer security
feature selection
network administrators
security policies
databases
data processing
text classification
security breaches