Smartphone strategic sampling in defending enterprise network security.
Feng LiWei PengChin-Tser HuangXukai ZouPublished in: ICC (2013)
Keyphrases
- network security
- security management
- knowledge management
- computer networks
- intrusion detection
- traffic analysis
- intrusion detection system
- network traffic
- security policies
- information security
- situation assessment
- case study
- network intrusion
- dos attacks
- risk assessment
- ip networks
- wired networks
- mobile devices
- decision making
- business strategy
- anomaly detection
- network administrators
- security protection
- security breaches
- real world
- anti phishing
- network management
- data processing
- information systems
- denial of service
- unsupervised learning
- data management