BYOZ: Protecting BYOD Through Zero Trust Network Security.
John AndersonQiqing HuangLong ChengHongxin HuPublished in: NAS (2022)
Keyphrases
- network security
- intrusion detection
- intrusion detection system
- computer networks
- traffic analysis
- information security
- security policies
- dos attacks
- network traffic
- security breaches
- computer security
- access control
- network intrusion
- anomaly detection
- security protection
- risk assessment
- situation assessment
- privacy concerns
- network monitoring
- denial of service
- network administrators
- social capital
- data mining
- packet filtering
- anti phishing