On the complexity of sabotage games for network security.
Dhananjay RajuGeorgios BakirtzisUfuk TopcuPublished in: CoRR (2023)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- network traffic
- situation assessment
- anomaly detection
- security policies
- computer security
- security protection
- information security
- risk assessment
- ip networks
- security breaches
- anti phishing
- dos attacks
- network intrusion
- network administrators
- lightweight
- information technology
- denial of service
- decision making
- end hosts
- databases
- real time