Network Security: Formal and Optimized Configuration.
Marfall N. FallMohamed MejriPublished in: SoMeT (2010)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- network traffic
- security policies
- information security
- risk assessment
- dos attacks
- security protection
- security breaches
- computer security
- anomaly detection
- situation assessment
- network intrusion
- network administrators
- end hosts
- packet filtering
- ip networks
- database systems
- anti phishing