Network security simulation and evaluation.
Yimin CuiTao ZouLufeng ZhangJinjing ZhaoPublished in: CSTST (2008)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- security policies
- anomaly detection
- network traffic
- computer security
- ip networks
- security breaches
- situation assessment
- risk assessment
- dos attacks
- information security
- learning algorithm
- security protection
- anti phishing
- network administrators
- network intrusion
- wireless sensor networks