A graph-based representation of relations in network security alert sharing platforms.
Martin HusákMilan CermákPublished in: IM (2017)
Keyphrases
- network security
- computer networks
- intrusion detection
- intrusion detection system
- traffic analysis
- network traffic
- network intrusion
- information security
- security policies
- risk assessment
- dos attacks
- computer security
- security breaches
- network intrusion detection
- ip networks
- anomaly detection
- computer systems
- decision making
- security protection
- metadata