Frontier technologies of trust computing and network security.
Yang XiangAhmed Al-DubiLei LiuXiaowen ChuPublished in: Concurr. Comput. Pract. Exp. (2015)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- dos attacks
- network traffic
- security policies
- risk assessment
- network intrusion
- computer security
- information security
- ip networks
- anomaly detection
- situation assessment
- network administrators
- cyber security
- security protection
- network attacks
- data mining
- packet filtering
- anti phishing
- denial of service
- network monitoring
- network management
- data processing
- decision making