Protecting Future Personal Computing: Challenging Traditional Network Security Models.
Helen Angela BrumfittBob AskwithBo ZhouPublished in: CIT/IUCC/DASC/PICom (2015)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- computer security
- security protection
- real world
- anomaly detection
- probabilistic model
- risk assessment
- databases
- real time
- access control
- data processing
- information security
- training data
- information retrieval
- security policies
- dos attacks