Enhancing Network Security By Preventing User-Initiated Malware Execution.
John V. HarrisonPublished in: ITCC (2) (2005)
Keyphrases
- network security
- network administrators
- computer networks
- traffic analysis
- intrusion detection
- intrusion detection system
- network traffic
- information security
- security protection
- dos attacks
- security breaches
- computer security
- risk assessment
- control flow
- network intrusion
- situation assessment
- information systems
- network management
- security policies
- anomaly detection
- ip networks
- data flow
- packet filtering
- databases
- anti phishing