نتایج جستجو برای: network security

تعداد نتایج: 818903  

Journal: :international journal of information science and management 0
m. keshtgary ph.d. , department of computer engineering shiraz university of technology, shiraz a. h. jahangir ph.d. , department of computer engineering sharif university of technology, tehran

society is growing increasingly dependent upon large-scale, highly distributed systems that operate in unbounded open network environments. unless safeguards are incorporated in the system, a failure of even a single component, e.g. a link or a node, can significantly impact the network performance and can cause highly expensive damages. the discipline of survivability attempts to ensure that n...

2008
Qing-Shan Jia

Electric power network is a fundamental facility in modern society. The importance to ensure and enhance the security of the power network can never be over emphasized. In this paper, we study how the topology of a power network restricts the security. By focusing on the power balanced condition which is necessary for the security after line outage contingencies, we show that a practical power ...

2007
Zhitang Li Jie Lei Li Wang Dong Li Yang-ming Ma

The growing deployment of network security mechanisms has brought great challenges to network security management. One most serious problem among them is that it is becoming increasingly difficult to identify the security incidents which pose true threat to the protected network system from tremendous volume of raw alerts. This paper presents our work on integrated management of network securit...

2016
Shumei liu

The development of network technology has brought convenience to people's life, but also provides the convenience for the virus, Trojan and other destructive programs to attack the network. Then, the computer network security is becoming more and more dangerous. Accurately and scientifically predict the risk of network, it can effectively prevent the risk, and reduce the loss caused by the prob...

2013
Ping He

This paper discusses in detail the theory of nonoptimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network system. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network security. At the same time, it also puts forward the non-optimu...

Journal: :CoRR 2014
Rabiah Ahmad S. Shahrin Muhamad Pahri Nor'Azuwa

Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and incompetence of the implementation. This paper proposes a model ...

Journal: :Inf. & Comput. Security 2015
Muhammad Adnan Mike Just Lynne Baillie Hilmi Günes Kayacik

Originality/value This paper proposes a new work practices model of network security professionals, which is built by consolidating existing empirical evidence and validated by conducting a survey of network security professionals. The findings enhance the understanding of tool developers about the day-to-day activities of network security professionals, consequently assisting developers in des...

2013
Jung Tae Kim

An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. Optimized security protocols and mechanisms are necessary for the high performance and security concerns. Finally, a challenge and requirement of adv...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

2014
Yolanda Mjikeliso Johan Van Niekerk Kerry-Lynn Thomson

One of the factors that play a major role in information security is people. People are the drivers of most processes and procedures in information security. However, many researchers agree that human aspects are not given enough attention; more focus is given to the technical security. This is especially true in the security of the underlying network infrastructure which is often seen as a tec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید