Login / Signup
Certifying Spoofing-Protection of Firewalls.
Cornelius Diekmann
Lukas Schwaighofer
Georg Carle
Published in:
CoRR (2016)
Keyphrases
</>
network security
information security
intrusion detection system
privacy protection
databases
neural network
biometric systems
security architecture
individual privacy
database
real time
evolutionary algorithm
computer systems
intrusion detection
security issues
liveness detection