Login / Signup
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation.
Atif Ahmad
Tobias Ruighaver
Published in:
Australian Computer, Network & Information Forensics Conference (2003)
Keyphrases
</>
network access
intrusion detection
network connection
security policies
information security
network security
database systems
data streams
access control
computer simulation
wireless networks
smart card
distributed databases