Login / Signup

Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems.

Huseyin CavusogluSrinivasan RaghunathanHasan Cavusoglu
Published in: Inf. Syst. Res. (2009)
Keyphrases
  • intrusion detection system
  • intrusion detection
  • computer systems
  • anomaly detection
  • network traffic
  • network security
  • computer security
  • multistage
  • computer networks
  • privacy concerns