Showing 1 - 20 results of 733 for search '"network security"', query time: 0.11s Refine Results
  1. 1

    Network security systems by M. A. Ganzhur, A. I. Bryukhovetsky

    Published 2022-11-01
    Subjects: “…network security…”
    Get full text
    Article
  2. 2

    Applied network security monitoring : collection, detection, and analysis / by Sanders, Chris

    Published 2014
    Subjects:
    View in OPAC
    Book
  3. 3
  4. 4
  5. 5
  6. 6

    Exploring Network Security Educator Knowledge by Jennifer B. Chauvot, Deniz Gurkan, Cathy Horn

    Published 2023-10-01
    “…It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. …”
    Get full text
    Article
  7. 7

    Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1

    Published 2007-01-01
    “…The current situations of sensor network security,the security challenges and the security problems were pre-sented.From the aspects of key management,secure routing,authentication,intrusion detection,DoS attack,access con-trol,all the security techniques of sensor networks were introduced and discussed,and the comparisons were made to help researchers select and design the security solutions for a particular sensor network application environment.At last,the further direction of sensor network security techniques was summarized and discussed.…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    An efficient method for network security situation assessment by Xiaoling Tao, Kaichuan Kong, Feng Zhao, Siyan Cheng, Sufang Wang

    Published 2020-11-01
    “…Network security situational assessment, the core task of network security situational awareness, can obtain security situation by comprehensively analyzing various factors that affect network status. …”
    Get full text
    Article
  11. 11

    Network Security Threats and Countermeasures on Cloud Computing by Ping Yao, Hong Li

    Published 2013-08-01
    “…Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud computing,the increasing risk of security is becoming a main and top issue.The type of cloud computing and the network security issues were discussed.A backup plan required for overcoming the network security issues in cloud computing was proposed.…”
    Get full text
    Article
  12. 12

    ”Common Criteria” and Software Defined Network Security by Andrey N. Petukhov, Paul L. Pilyugin

    Published 2019-03-01
    “…The specifics of SDN (software defined network) security solutions is largely driven by fundamental architectural principles of SDN technology itself − primarily by the separation of control and data flows, − and by conditions imposed by Open Flow protocol application. …”
    Get full text
    Article
  13. 13
  14. 14

    Automatic Verification Analysis Technology of Network Security Domain by Xiaofeng Liu, Bin Tan, Lan Qiu, Huanru Wang

    Published 2015-01-01
    “…It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.…”
    Get full text
    Article
  15. 15
  16. 16

    Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO

    Published 2020-09-01
    Subjects: “…space-ground network security guarantee…”
    Get full text
    Article
  17. 17
  18. 18

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  19. 19

    Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO

    Published 2020-09-01
    Subjects: “…space-ground network security guarantee;security situation aware;entity authentication and access protection;interconnection control;cipher on-demand service;dynamic reconstruction of security service…”
    Get full text
    Article
  20. 20