Concepedia

Publication | Closed Access

MADE

65

Citations

37

References

2018

Year

Abstract

Enterprises are targeted by various malware activities at a staggering rate. To counteract the increased sophistication of cyber attacks, most enterprises deploy within their perimeter a number of security technologies, including firewalls, antivirus software, and web proxies, as well as specialized teams of security analysts forming Security Operations Centers (SOCs).

References

YearCitations

Page 1