Passive security intelligence to analyze the security risks of mobile/BYOD activities.

IBM Journal of Research and Development(2016)

引用 6|浏览123
暂无评分
摘要
As enterprises embrace mobile technologies and enable their employees to bring their own devices, traditional security mechanisms are challenged by the col-location of personal and business activities on employee-owned mobile devices on the enterprise network. This presents a new risk to enterprises as employee-owned devices can now be used as stepping stones for bypassing traditional enterprise p...
更多
查看译文
关键词
Mobile handsets,Computer security,Monitoring,Mobile communication,Heuristic algorithms,IP networks,Protocols,Bring your own device
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要