Idology and Its Applications in Public Security and Network Security.
Shenghui SuJianhua ZhengZhiqiu HuangZhoujun LiZhenmin TangJian WangShuwang LüPublished in: CoRR (2016)
Keyphrases
- network security
- intrusion detection
- security policies
- information security
- computer networks
- security breaches
- computer security
- dos attacks
- intrusion detection system
- network traffic
- security management
- anomaly detection
- traffic analysis
- situation assessment
- security protection
- risk assessment
- ip networks
- network administrators
- denial of service
- smart grid
- security issues
- network access
- packet filtering
- cyber security
- cyber attacks
- security risks
- data mining techniques
- network attacks
- information systems
- databases