Login / Signup
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
Patrick Tague
David Slater
Jason Rogers
Radha Poovendran
Published in:
IEEE Trans. Dependable Secur. Comput. (2009)
Keyphrases
</>
network traffic
intrusion detection
network security
routing algorithm
anomaly detection
intrusion detection system
computer networks
network monitoring
network management
data analysis
information security
databases
internet traffic
traffic analysis
traffic engineering
detecting anomalous