Login / Signup
Situation evaluate on hierarchical network security based on D-S evidence theory.
Chundong Wang
Yu Zhang
Published in:
Int. J. Commun. Networks Distributed Syst. (2014)
Keyphrases
</>
network security
situation assessment
intrusion detection
traffic analysis
intrusion detection system
computer networks
risk assessment
dos attacks
network traffic
information fusion
security policies
security breaches
information security
security protection
network administrators
computer security
fault diagnosis
anomaly detection
learning algorithm
end hosts
packet filtering
ip networks
denial of service
unsupervised learning
decision making
wired networks
network intrusion
network attacks
real time
anti phishing