A Structured Investigation of Network Security Strategies and its Applications.
Shanti MakkaTripti MisraRajesh DeorariDeepak KumarVikas KumarBhaker PantPublished in: IC3I (2022)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- network traffic
- anomaly detection
- dos attacks
- information security
- risk assessment
- computer security
- security policies
- packet filtering
- network administrators
- security breaches
- anti phishing
- network intrusion
- situation assessment
- ip networks
- security protection
- denial of service
- real world
- databases
- denial of service attacks
- wired networks
- lightweight
- end hosts