Login / Signup
Advanced Persistent threats and how to monitor and deter them.
Colin Tankard
Published in:
Netw. Secur. (2011)
Keyphrases
</>
monitoring system
countermeasures
real time
data sets
malicious attacks
cyber security
data mining
information systems
database systems
information security
security issues