520 likes | 647 Views
Road Map. Introduction and backgroundDesignImplementationResultsDiscussionFuture work. Introduction and background Some of the problems we face. The importance of intrusion detectionObstaclesNetwork trafficComputational workloadDynamic problem domainPossibility of distributed, coordinated attacksLack of common vocabulary or standards.
E N D