Constitute the passive infrastructure in network
Only with passive technology on network security , it is impossible to build a soundly secretive application. There are many disadvantages in practice. In order to set up a more firm security network, we must take advantage of active technology. This paper presents us how to build a security network...
Saved in:
Main Authors: | YANG Shu-fan1, LI Fang-min1, ZHU Jian-qiu2, LIU Xin-fen 3 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2003-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74360793/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Available and unavailable decoys in capuchin monkeys (Sapajus spp.) decision-making
by: Marco Marini, et al.
Published: (2024-02-01) -
The information needs of female Police Officers involved in undercover prostitution work
by: Lynda M. Baker
Published: (2004-01-01) -
Proxy caching algorithm based on segment popularity for mobile streaming media
by: YANG Ge1, et al.
Published: (2007-01-01) -
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
by: Huanruo Li, et al.
Published: (2022-05-01) -
Cache prefetching strategy based on selective Markov model
by: CAI Wei-hong1, et al.
Published: (2010-01-01)