Network Threat Identification and Analysis Based on a State Transition Graph
With the rapid popularity of Internet and information technology, local area network is becoming insecure. Along with the improving advantages, security threats are emerging continually and bringing great pressure and challenges. An identification and analysis method for network real-time threats is...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2013-12-01
|
Series: | Cybernetics and Information Technologies |
Subjects: | |
Online Access: | https://doi.org/10.2478/cait-2013-0037 |