نتایج جستجو برای: network security
تعداد نتایج: 818903 فیلتر نتایج به سال:
society is growing increasingly dependent upon large-scale, highly distributed systems that operate in unbounded open network environments. unless safeguards are incorporated in the system, a failure of even a single component, e.g. a link or a node, can significantly impact the network performance and can cause highly expensive damages. the discipline of survivability attempts to ensure that n...
Electric power network is a fundamental facility in modern society. The importance to ensure and enhance the security of the power network can never be over emphasized. In this paper, we study how the topology of a power network restricts the security. By focusing on the power balanced condition which is necessary for the security after line outage contingencies, we show that a practical power ...
The growing deployment of network security mechanisms has brought great challenges to network security management. One most serious problem among them is that it is becoming increasingly difficult to identify the security incidents which pose true threat to the protected network system from tremendous volume of raw alerts. This paper presents our work on integrated management of network securit...
The development of network technology has brought convenience to people's life, but also provides the convenience for the virus, Trojan and other destructive programs to attack the network. Then, the computer network security is becoming more and more dangerous. Accurately and scientifically predict the risk of network, it can effectively prevent the risk, and reduce the loss caused by the prob...
This paper discusses in detail the theory of nonoptimum analysis on network systems. It points out that the main problem of exploring indefinite networks’ optimum lies in the lack of non-optimum analysis on the network system. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network security. At the same time, it also puts forward the non-optimu...
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. However, lack of understanding and method to develop the technical security metrics may lead to unachievable security control objectives and incompetence of the implementation. This paper proposes a model ...
Originality/value This paper proposes a new work practices model of network security professionals, which is built by consolidating existing empirical evidence and validated by conducting a survey of network security professionals. The findings enhance the understanding of tool developers about the day-to-day activities of network security professionals, consequently assisting developers in des...
An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. Optimized security protocols and mechanisms are necessary for the high performance and security concerns. Finally, a challenge and requirement of adv...
abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...
One of the factors that play a major role in information security is people. People are the drivers of most processes and procedures in information security. However, many researchers agree that human aspects are not given enough attention; more focus is given to the technical security. This is especially true in the security of the underlying network infrastructure which is often seen as a tec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید