Using the COMPA autonomous architecture for mobile network security.
Liam FallonJohn KeeneyMark McFaddenJohn M. QuiltySven van der MeerPublished in: IM (2017)
Keyphrases
- network security
- intrusion detection
- network access
- computer networks
- intrusion detection system
- situation assessment
- traffic analysis
- security policies
- network traffic
- dos attacks
- anomaly detection
- information security
- security protection
- mobile devices
- network intrusion
- cyber security
- ip networks
- risk assessment
- real time
- anti phishing
- security breaches
- packet filtering
- network monitoring
- peer to peer
- databases