Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2019
Security Monitoring of IoT Communication Using Flows
ECBS '19: Proceedings of the 6th Conference on the Engineering of Computer Based SystemsArticle No.: 18, Pages 1–9https://doi.org/10.1145/3352700.3352718Network monitoring is an important part of network management that collects valuable metadata describing active communication protocols, network transmissions, bandwidth utilization, and the most communicating nodes. Traditional IP network monitoring ...
- research-articleSeptember 2019
Automating Network Security Analysis at Packet-level by using Rule-based Engine
ECBS '19: Proceedings of the 6th Conference on the Engineering of Computer Based SystemsArticle No.: 14, Pages 1–8https://doi.org/10.1145/3352700.3352714When a network incident is detected, a network administrator has to manually verify the incident and provide a solution to stop the incident from continuing and prevent similar incidents in the future. The network analysis is a time-consuming and labor-...