Login / Signup
Certifying spoofing-protection of firewalls.
Cornelius Diekmann
Lukas Schwaighofer
Georg Carle
Published in:
CNSM (2015)
Keyphrases
</>
information security
network security
computer vision
protection scheme
neural network
intrusion detection system
data protection
database
real time
data sets
data mining
anomaly detection
security issues
critical infrastructure