Configuring networks with content filtering nodes with applications to network security.
Murali S. KodialamT. V. LakshmanSudipta SenguptaPublished in: INFOCOM (2005)
Keyphrases
- network security
- computer networks
- end hosts
- intrusion detection system
- network nodes
- intrusion detection
- network structure
- wired networks
- traffic analysis
- network traffic
- risk assessment
- anomaly detection
- information security
- security policies
- dos attacks
- security breaches
- security protection
- anti phishing
- mobile nodes
- social networks
- situation assessment
- ip networks
- wireless ad hoc networks
- network management
- internet traffic
- metadata
- network resources
- smart card
- shortest path
- computer systems
- network administrators
- machine learning
- real world