Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
Applied network security monitoring : collection, detection, and analysis /
Published 2014Subjects: View in OPAC
Book -
3
-
4
-
5
-
6
Exploring Network Security Educator Knowledge
Published 2023-10-01“…It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. …”
Get full text
Article -
7
Survey of wireless sensor network security techniques
Published 2007-01-01“…The current situations of sensor network security,the security challenges and the security problems were pre-sented.From the aspects of key management,secure routing,authentication,intrusion detection,DoS attack,access con-trol,all the security techniques of sensor networks were introduced and discussed,and the comparisons were made to help researchers select and design the security solutions for a particular sensor network application environment.At last,the further direction of sensor network security techniques was summarized and discussed.…”
Get full text
Article -
8
System and Network Security: Anomaly Detection and Monitoring
Published 2016-01-01Get full text
Article -
9
Towards the Application of GraphRAG to Network Security
Published 2025-05-01Subjects: Get full text
Article -
10
An efficient method for network security situation assessment
Published 2020-11-01“…Network security situational assessment, the core task of network security situational awareness, can obtain security situation by comprehensively analyzing various factors that affect network status. …”
Get full text
Article -
11
Network Security Threats and Countermeasures on Cloud Computing
Published 2013-08-01“…Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud computing,the increasing risk of security is becoming a main and top issue.The type of cloud computing and the network security issues were discussed.A backup plan required for overcoming the network security issues in cloud computing was proposed.…”
Get full text
Article -
12
”Common Criteria” and Software Defined Network Security
Published 2019-03-01“…The specifics of SDN (software defined network) security solutions is largely driven by fundamental architectural principles of SDN technology itself − primarily by the separation of control and data flows, − and by conditions imposed by Open Flow protocol application. …”
Get full text
Article -
13
Using Gamification to Enhance Mastery of Network Security Concepts
Published 2024-07-01Get full text
Article -
14
Automatic Verification Analysis Technology of Network Security Domain
Published 2015-01-01“…It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.…”
Get full text
Article -
15
Advances in network security and new anomaly detection techniques
Published 2025-06-01Subjects: Get full text
Article -
16
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01Subjects: “…space-ground network security guarantee…”
Get full text
Article -
17
Overview on Intrusion Detection Systems for Computers Networking Security
Published 2025-03-01Subjects: Get full text
Article -
18
Multi-layered based network security defense system
Published 2007-01-01“…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
Get full text
Article -
19
Research on Space-Ground Network Security Guarantee Technology
Published 2020-09-01Subjects: “…space-ground network security guarantee;security situation aware;entity authentication and access protection;interconnection control;cipher on-demand service;dynamic reconstruction of security service…”
Get full text
Article -
20