The research and design of network security evaluation systems based on cloud model.
Ziyan ShiHaihong LiBoling ChengPublished in: FSKD (2012)
Keyphrases
- network security
- cloud model
- intrusion detection
- situation assessment
- computer networks
- security breaches
- computer security
- network traffic
- intrusion detection system
- distributed systems
- training data
- anomaly detection
- computer systems
- data mining
- traffic analysis
- network intrusion
- decision making
- security policies
- risk assessment
- ip networks
- probabilistic model
- association rules