An Efficient and Scalable Pattern Matching Scheme for Network Security Applications.
Tsern-Huei LeeNai-Lun HuangPublished in: ICCCN (2008)
Keyphrases
- network security
- matching scheme
- intrusion detection
- computer networks
- shape matching
- intrusion detection system
- network traffic
- image matching
- coarse to fine
- traffic analysis
- matching algorithm
- dos attacks
- risk assessment
- situation assessment
- security breaches
- anomaly detection
- information security
- dynamic programming
- network administrators
- real world
- deformable models
- object recognition
- pattern recognition
- computer vision
- surface matching
- data mining