Login / Signup
An active networks security architecture.
Arso Savanovic
Dusan Gabrijelcic
Borka Jerman-Blazic
Stamatis Karnouskos
Published in:
Informatica (Slovenia) (2002)
Keyphrases
</>
security architecture
access control
security policies
intrusion detection system
social networks
data integrity
security model
computer networks
security mechanisms
database systems
anomaly detection
insider threat