The energy cost of network security: A hardware vs. software comparison.
André Luiz Pereira de FrançaRicardo P. JasinskiPaulo CeminVolnei A. PedroniAltair Olivo SantinPublished in: ISCAS (2015)
Keyphrases
- network security
- computer systems
- computer networks
- intrusion detection
- intrusion detection system
- security risks
- traffic analysis
- network traffic
- real time
- information security
- hardware and software
- security breaches
- computer security
- anomaly detection
- energy consumption
- security policies
- risk assessment
- security protection
- dos attacks
- situation assessment
- network access
- packet filtering
- anti phishing
- network administrators
- network monitoring
- energy efficiency
- data processing
- query processing
- data analysis
- reinforcement learning
- database systems
- information systems