H Elazhary - Journal of network and computer applications, 2019 - Elsevier
Currently, we are experiencing a technological shift, which is expected to change the way we program and interact with the world. Cloud computing and mobile computing are two …
This article describes the proposal of a system that was designed for effective network monitoring, analysis of network infiltration, and archiving of network flows for their later …
Article provides guidance on how to implement an introductory course at university during one semester for future cybersecurity analysts, built on the basis of the Cisco Certified …