Keyphrases
- proceedings of the th international conference
- network security
- computer networks
- intrusion detection
- volume part ii
- intrusion detection system
- image analysis and processing
- image analysis and recognition
- traffic analysis
- network traffic
- image computing and computer assisted intervention
- risk assessment
- advances in computational intelligence
- dos attacks
- information security
- artificial intelligence and law
- anomaly detection
- computer systems
- security protection
- artificial intelligence
- situation assessment
- anti phishing
- advances in database technology
- databases
- network administrators
- pattern recognition
- hybrid artificial intelligence systems
- cyber security
- machine learning