Search
Now showing items 1-1 of 1
Detection of Proxy Misconfigurations via Log Alarms
(IEEE, 2018)
Today, institutions use proxy products for the internet access of their users and arrange the internet access policies of their users by way of this device. Even though proxy takes on the internet access load of the ...