Abstract
The flow of information, within organizations, between networks, and from single users to other individuals and networks, is commonly at rates that only a few years ago were dreams. Earlier methods for the detection and prevention of malicious activities are anywhere from inefficient to unworkable with transmissions at the giga speeds that are prevalent today. This writing sets forth the problems and threats associated with these new high speed transmissions, and presents methodologies and systems for treating them.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have