Showing 1 - 20 results of 414 for search '"network security"', query time: 0.07s Refine Results
  1. 1
  2. 2

    Survey on network security based on blockchain by Ye CHEN, Dongjin XU, Liang XIAO

    Published 2018-03-01
    Subjects: “…network security…”
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Survey of wireless sensor network security techniques by PEI Qing-qi1, SHEN Yu-long1, MA Jian-feng1

    Published 2007-01-01
    “…The current situations of sensor network security,the security challenges and the security problems were pre-sented.From the aspects of key management,secure routing,authentication,intrusion detection,DoS attack,access con-trol,all the security techniques of sensor networks were introduced and discussed,and the comparisons were made to help researchers select and design the security solutions for a particular sensor network application environment.At last,the further direction of sensor network security techniques was summarized and discussed.…”
    Get full text
    Article
  6. 6
  7. 7

    Big Data Application in Network Security Analysis by Shuai Wang, Laifu Wang, Huamin Jin, Jun Shen

    Published 2015-07-01
    “…With the rapid growth of network security information scale,how to apply big data in network security analysis has become the network security research hotspot.From the perspective of the requirement of network security analysis and insufficient of traditional technique,the necessity of introducing big data analysis technology was analyzed,and the application of big data in network security analysis was discussed from aspects of security data storage,retrieval and analysis.On this basis,the network security analysis platform based on big data was proposed,and the correlation analysis methods of typical attack scenarios were detailed.…”
    Get full text
    Article
  8. 8
  9. 9

    Network Security Threats and Countermeasures on Cloud Computing by Ping Yao, Hong Li

    Published 2013-08-01
    “…Cloud computing is a new concept of providing virtualized resources to the consumers.Consumers can request a cloud for services,applications,solution and can store large amount of data in different locations.But with the growing popularity of cloud computing,the increasing risk of security is becoming a main and top issue.The type of cloud computing and the network security issues were discussed.A backup plan required for overcoming the network security issues in cloud computing was proposed.…”
    Get full text
    Article
  10. 10

    Automatic Verification Analysis Technology of Network Security Domain by Xiaofeng Liu, Bin Tan, Lan Qiu, Huanru Wang

    Published 2015-01-01
    “…It ensures border access control policy is minimized and network security domain is divided continued compliance, reduces the risks associated with the security domain management.…”
    Get full text
    Article
  11. 11

    Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO

    Published 2020-09-01
    Subjects: “…space-ground network security guarantee…”
    Get full text
    Article
  12. 12

    Multi-layered based network security defense system

    Published 2007-01-01
    “…A multi-layered based network security defense system(MNSDS) was presented.MNSDS adopts multi-layered detection technology: for the detection of IP layer,aggregate-based congestion control algorithm(ABCC) was adopted,narrowing the congestion signature,and thus minimizing collateral damage;then,it employs the detection technology based on the artificial immune principle in TCP and UDP layers AIPT,and detects intrusion by creating a rule database and matching the appropriate rule.The simulation results indicate that the system not only can provide relief from DoS/DDoS attacks equally,but also resolve problems existing in the current defense systems such as low speed high false positive probability and high false positive probability,poor real-time and more artificial interventions.…”
    Get full text
    Article
  13. 13

    Survey of attack graph based network security metric by Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG

    Published 2018-09-01
    Subjects: “…network security metric…”
    Get full text
    Article
  14. 14

    Study and implementation of integrated network security monitoring system by ZHANG Hui-min, QIAN Yi-ping, ZHENG Qing-hua, DONG Shi-jie, GUAN Xiao-hong

    Published 2003-01-01
    “…As the kernel of integrated network security and defense system, the prototype of NSMS has already been developed and tested, it is proved to be efficient, open and practical in network security monitoring.…”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Behavior-oriented inside network security situation modeling and analysis by Cheng ZHU, Jia-jia MIAO, Han-dong MAO

    Published 2016-08-01
    “…According to the situation awareness theory as well as the characteristics of the inside network security,a PMDV model for behavior-oriented inside network security situation modeling by dividing the inside network space into physical domain,information domain and social domain was proposed.A sound base for situation modeling of inside network security,which classified the entities inside the network space into the following 4 classes:person(P),machine(M),data(D) and virtual agent(V),was provided and the core element “behavior” in situation model with the interactions between different PMDV entities was defined.The structure and implementation guideline of the situation analysis platform based on PMDV model were also presented and studied.…”
    Get full text
    Article
  19. 19
  20. 20