A stepping stone perspective to detection of network threats
Current computing trends such as cloud computing, file sharing and social networking promote collaboration and allow greater mobility for users.Nevertheless, these computing trends increase the vulnerability of networks to security threats and challenge network resources.An ingenious technique em...
Main Authors: | Omar, Mohd Nizam, Amphawan, Angela, Din, Roshidi |
---|---|
Format: | Article |
Language: | English |
Published: |
North Atlantic University Union
2013
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/14208/1/Step.pdf |
Similar Items
-
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006) -
Detecting backdoor using stepping stone detection approach
by: Alminshid, Khalid, et al.
Published: (2013) -
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al. -
Stepping-stone detection technique for recognizing legitimate and attack connections
by: Daud, Ali Yusny, et al.
Published: (2015)