Login / Signup
Performance Analysis of Mimic Defense based SDN Security Policy.
Desheng Zhang
Jianhui Zhang
Youjun Bu
Published in:
ICCIR (2022)
Keyphrases
</>
security policies
network security
intrusion detection
security management
computer networks
access control
intrusion detection system
security concerns
security architecture
information security
network management
security requirements
network traffic
distributed systems
access control systems
home network
access control policies
unauthorized access
security measures
advanced research projects agency
event logs
ubiquitous computing environments
computer systems
data analysis
real world
databases