Self-Configuration of Network Security.
Huoping ChenYoussif B. Al-NashifGuangzhi QuSalim HaririPublished in: EDOC (2007)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- risk assessment
- network traffic
- anomaly detection
- dos attacks
- computer security
- security breaches
- security policies
- network administrators
- information security
- ip networks
- network intrusion
- security protection
- anti phishing
- packet filtering
- machine learning
- situation assessment
- computer systems
- principal component analysis