icon-carat-right menu search cmu-wordmark

Incorporating Network Flows in Intrusion Incident Handling and Analysis

Presentation
In this presentation, John Gerth discusses the role network flows play in computer security intrusion investigations.
Publisher

Software Engineering Institute

Abstract

In this presentation, given at FloCon 2008, John Gerth discusses the role network flows play in computer security intrusion investigations.

Part of a Collection

FloCon 2008 Collection

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.