Login / Signup
Multi-granular aggregation of network flows for security analysis.
Tao Ding
Ahmed AlEroud
George Karabatis
Published in:
ISI (2015)
Keyphrases
</>
security analysis
network flow
public key
smart card
security requirements
image encryption
high security
integer programming
minimum cost
linear programming
user authentication
authentication protocol
optimization model
mutual authentication
encryption scheme
authentication scheme
information systems
data mining