How bad are selfish investments in network security?
Libin JiangVenkat AnantharamJean C. WalrandPublished in: IEEE/ACM Trans. Netw. (2011)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- risk assessment
- information technology
- dos attacks
- network traffic
- information security
- situation assessment
- anomaly detection
- security policies
- computer security
- security breaches
- security protection
- network administrators
- anti phishing
- network intrusion
- probabilistic model
- denial of service
- ip networks
- wired networks
- database systems
- databases
- real time