Cited By
View all- Siddiqui ARimal BReisslein MWang Y(2024)Survey on Unified Threat Management (UTM) Systems for Home NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338247026:4(2459-2509)Online publication date: Dec-2025
Since the beginning, computer systems have faced the challenge of protecting the information with which they work, and with the technological development, computational security techniques have become more complex to face the potentials attacks. ...
Cyber security attacks have been on the rise in recent years. One of the most destructive attacks are known as advanced persistent threat (APT) attacks which can inflict massive damages to a network. A common approach of testing the security of an IT ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format