Journal of Information Security
Vol.5 No.2(2014), Paper ID 43654, 9 pages
DOI:10.4236/jis.2014.52004
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
Andrew Blyth
Information Security Research Group, University of South Wales, Pontypridd, UK
Copyright © 2014 Andrew Blyth et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
How to Cite this Article
Download citation as EndNote
Copyright © 2024 by authors and Scientific Research Publishing Inc.
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.