Network Security Using ECC with Biometric.
Dindayal MahtoDilip Kumar YadavPublished in: QSHINE (2013)
Keyphrases
- network security
- computer networks
- intrusion detection
- intrusion detection system
- traffic analysis
- network traffic
- biometric systems
- pattern recognition
- anomaly detection
- network intrusion
- dos attacks
- information security
- security policies
- risk assessment
- security breaches
- network administrators
- ip networks
- security protection
- situation assessment
- anti phishing
- user authentication
- elliptic curve
- feature extraction
- packet filtering
- reinforcement learning
- denial of service
- distributed systems
- principal component analysis