Breaking network security based on synchronized chaos.
Gonzalo ÁlvarezShujun LiPublished in: Comput. Commun. (2004)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- network traffic
- risk assessment
- information security
- anomaly detection
- network intrusion
- ip networks
- dos attacks
- security breaches
- security policies
- situation assessment
- chaotic systems
- network administrators
- computer security
- end hosts
- security protection
- anti phishing
- denial of service
- data processing
- object recognition
- real world