These are the sources and citations used to research IT-643-Q1666 Network Assessment & Defense 22TW1 - 2-1 Discussion: Traffic Analysis Scenario. This bibliography was generated on Cite This For Me on
In-text: (Khraisat, Gondal, Vamplew and Kamruzzaman, 2019)
Your Bibliography: Khraisat, A., Gondal, I., Vamplew, P. and Kamruzzaman, J., 2019. Survey of intrusion detection systems: techniques, datasets and challenges. [online] SpringerOpen. Available at: <https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0038-7> [Accessed 31 August 2022].
In-text: (What is NetFlow? - Network Traffic Monitoring Software, 2022)
Your Bibliography: PROGRESS WHATSUP GOLD. 2022. What is NetFlow? - Network Traffic Monitoring Software. [online] Available at: <https://www.whatsupgold.com/network-traffic-monitoring/netflow> [Accessed 31 August 2022].
In-text: (Shimeall, 2016)
Your Bibliography: Shimeall, T., 2016. Traffic Analysis for Network Security: Two Approaches for Going Beyond Network Flow Data. [online] SEI Blog. Available at: <https://insights.sei.cmu.edu/blog/traffic-analysis-for-network-security-two-approaches-for-going-beyond-network-flow-data/> [Accessed 31 August 2022].
In-text: (Types of Network Traffic | The Help Centre, n.d.)
Your Bibliography: www.afrihost.com. n.d. Types of Network Traffic | The Help Centre. [online] Available at: <https://help.afrihost.com/entry/types-of-network-traffic> [Accessed 31 August 2022].
10,587 students joined last month!