Survey on cyberspace security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

Child Security in Cyberspace Through Moral Cognition

The increasing number of threats in cyberspace has meant that every internet user is at a greater risk than ever before. Children are no exception to this exploitation, incurring psychological and financial stress. Technology is on a persistent pursuit of offering exquisite solution to address the problems associated with children on the cyberspace. With every new product for parental control t...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

Cyberspace security: How to develop a security strategy

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The international community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, including t...

متن کامل

Guaranteeing Security and Privacy in Cyberspace

The Refereeing Process for the Data & Knowledge Engineering Journal as it is and will be executed in Cyberspace is the subject of this lecture, in particular Security and Privacy aspects.This process can be defined and implemented in the Mokum system; we will show that it complies to the Security and Privacy rules on three levels: 1. Highest: at the Conceptual level. The semantic correctness of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2015

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-015-5433-4