A survey of security visualization for computer network logs
β Scribed by Yanping Zhang; Yang Xiao; Min Chen; Jingyuan Zhang; Hongmei Deng
- Book ID
- 112206299
- Publisher
- John Wiley and Sons
- Year
- 2011
- Tongue
- English
- Weight
- 785 KB
- Volume
- 5
- Category
- Article
- ISSN
- 1939-0114
- DOI
- 10.1002/sec.324
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be
A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Three experiments were conducted to find a better way for a computer access security system. The neural networks are trained using time intervals betwe