Random spanning trees for expanders, sparsifiers, and virtual network security.
Shlomi DolevDaniel KhankinPublished in: Comput. Commun. (2023)
Keyphrases
- network security
- spanning tree
- intrusion detection
- edge disjoint
- computer networks
- minimum cost
- minimum spanning tree
- traffic analysis
- intrusion detection system
- network traffic
- security protection
- security breaches
- minimum spanning trees
- dos attacks
- risk assessment
- anomaly detection
- information security
- situation assessment
- anti phishing
- security policies
- ip networks
- network attacks
- wireless sensor networks
- information systems
- databases
- network monitoring
- weighted graph
- network administrators
- packet filtering