A Review of Graph Approaches to Network Security Analytics.
Steven NoelPublished in: From Database to Cyber Security (2018)
Keyphrases
- network security
- intrusion detection
- traffic analysis
- computer networks
- intrusion detection system
- security policies
- anomaly detection
- business intelligence
- network traffic
- security protection
- security breaches
- network administrators
- real time
- dos attacks
- cloud computing
- situation assessment
- maximum likelihood
- data management
- information technology