Login / Signup
Critical analysis of layer 2 network security in virtualised environments.
Ronny L. Bull
Jeanna N. Matthews
Published in:
Int. J. Commun. Networks Distributed Syst. (2016)
Keyphrases
</>
network security
computer networks
intrusion detection
risk assessment
intrusion detection system
traffic analysis
anomaly detection
network traffic
information systems
database systems
supervised learning
decision support
situation assessment
network intrusion