Security Perimeter Eng. Mohammad Adly, M. Sc.. Intrusion Detection Host-based – HIDS, HIPS Network-based – NIDS, NIPS.
Visualizing network flows Gregory Travis Advanced Network Management Lab Indiana University [email protected].
A primer on network flow visualization
Information Visualization for Intrusion Detection Analysis: A Needs Assessment of Security Experts John Goodall, Anita Komlodi, Wayne G. Lutters UMBC Workshop.
Security Perimeter