Login / Signup
Design and Configuration of a Network Security and Forensics Lab.
Joseph M. Kizza
Billy Harris
Mike Ward
Published in:
International Conference on Internet Computing (2005)
Keyphrases
</>
network security
intrusion detection
intrusion detection system
traffic analysis
case study
anomaly detection
computer networks
dos attacks
network traffic
network intrusion detection
network intrusion
security protection