The Vision of Self-aware Reordering of Security Network Function Chains.
Lukas IffländerJürgen WalterSimon EismannSamuel KounevPublished in: ICPE Companion (2018)
Keyphrases
- computer vision
- buffer overflow
- network connection
- access control
- wireless sensor networks
- peer to peer
- security measures
- application level
- intrusion detection and prevention
- virtual private network
- taking care
- enterprise network
- network administrators
- security management
- security requirements
- network model
- image processing
- vision system
- network traffic
- intrusion detection
- real time
- security protection
- neural network
- ns simulator
- network structure
- internet service providers
- network security
- forensic analysis
- network services
- network topologies
- network architecture