WAN-hacking with AutoHack: Auditing Security Behind the Firewall.
Alec MuffettPublished in: USENIX Security Symposium (1995)
Keyphrases
- security threats
- network security
- intrusion detection
- access control
- security enforcement
- security risks
- java card
- malicious code detection
- statistical databases
- penetration testing
- security issues
- information security
- security mechanisms
- inference control
- key management
- security architecture
- security requirements
- computer security
- network traffic
- intrusion detection system
- security systems
- security vulnerabilities
- packet filtering
- intelligence and security informatics
- security analysis
- security level
- smart card
- security model
- data mining
- security policies
- data center
- cyber security
- security protocols
- security measures
- unauthorized access
- computer networks
- e government
- information systems