Login / Signup

Traffic-Aware Firewall Optimization Strategies.

Subrata AcharyaJia WangZihui GeTaieb ZnatiAlbert G. Greenberg
Published in: ICC (2006)
Keyphrases
  • optimization strategies
  • network traffic
  • intrusion detection
  • transformation rules
  • intrusion detection system
  • optimization methods
  • anomaly detection
  • database
  • databases
  • software engineering