Software development and design of network security system based on log data.
Lin ShiYang MaYan LvLiquan ChenPublished in: J. Electronic Imaging (2022)
Keyphrases
- network security
- log data
- software development
- case study
- computer networks
- network traffic
- intrusion detection system
- intrusion detection
- dos attacks
- traffic analysis
- security policies
- risk assessment
- data mining techniques
- decision support system
- anomaly detection
- database systems
- software projects
- databases
- security breaches