Towards a Unified Modeling and Verification of Network and System Security Configurations.
Mohammed Noraden AlsalehEhab Al-ShaerAdel El-AtawyPublished in: SafeConfig (2012)
Keyphrases
- network management
- security threats
- network administrators
- security measures
- security protection
- network model
- network structure
- computer networks
- security issues
- network services
- java card
- cyber attacks
- network security
- communication networks
- network traffic
- intrusion detection
- access control
- virtual private network
- network monitoring
- information security
- forensic analysis
- high security
- buffer overflow
- intrusion prevention
- integrity verification
- wireless sensor networks
- enterprise network
- internet service providers
- network topologies
- application level
- peer to peer