An Implementation of Vulnerability Evaluation System for Network Security on CC.
Jeom Goo KimYoung-Cheol LeeJae-Kwang LeePublished in: PDPTA (2000)
Keyphrases
- network security
- risk assessment
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- information security
- denial of service
- security risks
- computer security
- network traffic
- security policies
- network intrusion
- anomaly detection
- dos attacks
- security protection
- network administrators
- databases
- anti phishing
- situation assessment
- data management
- probabilistic model
- learning algorithm