Strong Security for Network-Attached Storage.
Ethan L. MillerDarrell D. E. LongWilliam E. FreemanBenjamin ReedPublished in: FAST (2002)
Keyphrases
- network management
- security threats
- network monitoring
- enterprise network
- network administrators
- network security
- cyber attacks
- virtual private network
- computer networks
- wireless sensor networks
- security protection
- security measures
- forensic analysis
- network services
- complex networks
- network traffic
- security issues
- network connection
- intrusion detection
- network model
- security management
- network architecture
- security problems
- security architecture
- network layer
- security policies
- key management
- buffer overflow
- peer to peer
- information systems
- intrusion detection and prevention