Login / Signup

Advanced Persistent threats and how to monitor and deter them.

Colin Tankard
Published in: Netw. Secur. (2011)
Keyphrases
  • monitoring system
  • countermeasures
  • real time
  • data sets
  • malicious attacks
  • cyber security
  • data mining
  • information systems
  • database systems
  • information security
  • security issues