Sciweavers

2 search results - page 1 / 1
» Design of a Network-Access Audit Log for Security Monitoring...
Sort
View
AUSFORENSICS
2003
13 years 6 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
CLEIEJ
1998
134views more  CLEIEJ 1998»
13 years 4 months ago
Firewall Monitoring
Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks,...
Ernst L. Leiss, Jianyu You