We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Sorry, we do not have enough data to show an influence graph for this author.
Learn More
This paper presents an efficient intrusion detection model for packet processing. Packet capture device detect the network data packets directly after capture them, instead of detecting them after restructuring, thus the efficiency of detection can be improved. Current products of intrusion detection use the packet restructuring mechanism in order to reduce(More)
  • 1