Sign in
The Threat From Within -An Analysis of Attacks on anInternal Network.
John Haggerty
Qi Shi
Madjid Merabti
Published in:
SEC (2002)
Keyphrases
</>
countermeasures
traffic analysis
data analysis
information systems
image analysis
network traffic
communication networks
network model
watermarking scheme
security risks
malicious attacks
network anomaly detection