Security Operation Support by Estimating Cyber Attacks Without Traffic Decryption.
Shohei HirutaItaru HosomiHirokazu HasegawaHiroki TakakuraPublished in: COMPSAC (2023)
Keyphrases
- cyber attacks
- cyber security
- cyber defense
- security breaches
- security policies
- dos attacks
- intrusion detection
- countermeasures
- critical infrastructure
- intrusion detection system
- network security
- cyber crime
- smart grid
- network traffic
- access control
- real time
- security issues
- traffic flow
- information security
- security mechanisms
- visual analytics
- wireless networks
- anomaly detection