The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2002 vol.6)
pp: 60-66
ABSTRACT
<p>Analysis of individual traffic flows is essential to a complete understanding of network usage, but real-time monitoring requires significant resources and doesn?t scale well. Network forensic analysis offers a more practical way to monitor and identify security vulnerabilities and configuration problems.</p>
CITATION
Vicka Corey, Charles Peterman, Sybil Shearin, Michael S. Greenberg, James Van Bokkelen, "Network Forensics Analysis", IEEE Internet Computing, vol.6, no. 6, pp. 60-66, November/December 2002, doi:10.1109/MIC.2002.1067738
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool