This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Network Forensics Analysis
November/December 2002 (vol. 6 no. 6)
pp. 60-66

Analysis of individual traffic flows is essential to a complete understanding of network usage, but real-time monitoring requires significant resources and doesn?t scale well. Network forensic analysis offers a more practical way to monitor and identify security vulnerabilities and configuration problems.

Citation:
Vicka Corey, Charles Peterman, Sybil Shearin, Michael S. Greenberg, James Van Bokkelen, "Network Forensics Analysis," IEEE Internet Computing, vol. 6, no. 6, pp. 60-66, Nov.-Dec. 2002, doi:10.1109/MIC.2002.1067738
Usage of this product signifies your acceptance of the Terms of Use.