Using Virtualization to Create and Deploy Computer Security Lab Exercises.
Brian HayRonald DodgeKara L. NancePublished in: SEC (2008)
Keyphrases
- computer security
- computer systems
- intrusion detection
- anomaly detection
- operating system
- information security
- network security
- cloud computing
- network intrusion detection
- intrusion detection system
- data center
- virtual machine
- high availability
- databases
- information technology
- knowledge discovery
- data processing
- data streams
- information systems