Research on Computer Network Security

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on Application of Neural Network in Computer Network Security Evaluation

Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100group data on the computer network security evaluation of di...

متن کامل

" Computer Network Security "

The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-...

متن کامل

Research on Context Aware Network Security Model

According to high development of internet and mobile internet technologies, more and more services and applications are researched and are becoming more and more important in people’s life. At the same time, there are still many risks that virus attack from internet. Network security is facing more challenges than before, such as attack method becoming more diversify, attack times are increasin...

متن کامل

Construction Research of Computer Network System Security based on Distributed Intrusion Detection Technology

A classified computer network is vulnerable to external and internal attacks in the Internet environment. It is difficult to get a lot of training sample of the security computer network system at the actual situation. This paper aimed to analyze the security of the computer network under the distributed intrusion detection. We studied how to increase the intrusion detection accuracy in the cas...

متن کامل

Research on Network Defense Graph Model in Network Security

Security analysis and attack-defense modeling are effective method to identify the vulnerabilities of information systems for proactive defense. The attack graph model reflects only attack actions and system state changes, without considering the perspective of the defenders. To assess the network information system and comprehensively show attack and defense strategies and theirs cost, a defen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: DEStech Transactions on Engineering and Technology Research

سال: 2017

ISSN: 2475-885X

DOI: 10.12783/dtetr/ismii2017/16677