Security techniques for zero day attacks.
Udaya Kiran TupakulaVijay VaradharajanPublished in: IWCMC (2011)
Keyphrases
- information security
- security issues
- intrusion detection
- security requirements
- high security
- security problems
- data sets
- security systems
- security policies
- access control
- key management
- security protocols
- data security
- authentication protocol
- security management
- security level
- security vulnerabilities
- real time
- information assurance
- security model
- security analysis
- security mechanisms
- rfid tags
- network security
- control system
- genetic algorithm
- neural network
- databases