Quantum network security dependent on the connection density between trusted nodes.
Andrei GaidashGeorge MiroshnichenkoAnton KozubovPublished in: JOCN (2022)
Keyphrases
- network security
- end hosts
- intrusion detection
- intrusion detection system
- computer networks
- traffic analysis
- network traffic
- information security
- dos attacks
- risk assessment
- anomaly detection
- security policies
- security protection
- computer security
- situation assessment
- denial of service
- security breaches
- machine learning
- network monitoring
- decision making
- network access
- network attacks
- shortest path
- data processing
- network intrusion detection
- e government
- data streams
- network administrators
- feature selection
- information systems