共检索到375条结果
学科分类
全部
订阅
收起
  • [会议论文] ,2011 - 2011 3rd International Conference on Computer and Network Technology(ICCNT 2011) (2011第三届IEEE计算机与网络技术国际会议)
    Fast Internet growth and increase in number of network attack make network security essential in recent years. This paper proposes a novel approach to evaluate the network security situation using Netw...
    network security index systemnetwork securitysituation evaluation
  • [会议论文] ,2010 - 2010 International Conference on Circuit and Signal Processing(2010年电路与信号处理国际会议 ICCSP 2010)
    approach mines detection rule models from network connection data. With rough set theory, several key problems can be solved, such as data completion, data discretization, and data reduction. Tests sho...
    Rough Set TheoryNetwork Security Network security evaluation
  • [会议论文] ,2009 - 第三届亚洲精细农业会议暨第五届智能化农业信息技术国际会议
    In recent years, the agricultural information network construction has made a great progress in China. With the level of network openness improved, the probability of network attacked is increasing. So...
    agricultural informationnetwork securitynetwork security protection architecturedefensive strategy
  • [会议论文] ,2017 - ICEFS2017(International Conference on Economics, Finance and Statistics 2017) (2017经济、金融与统计国际会议)
      In today's world,the Internet has become an indispensable part of our daily life,work and study.In order to meet the growing needs of users,the network has been expanding,from inside and outside the ...
    Network securityFuzzy algorithmComprehensive evaluationSecurity evaluation
  • [会议论文] ,2016 - 2016中国国际供电会议(CICED2016)
      With development of smart grid and demand extension of company's own business, wired network of national grid company which now existed, cannot satisfy mobile internet business requirement that relat...
    TD LTEdigital clustering systemprivate wireless networknetwork security
  • [会议论文] ,2016 - International Asia-Pacific Web Conference(第18届国际亚太互联网大会)
      Network covert channel (referred to as network steganography) is a covert communication technique that uses the redundancies of network protocols to transfer secret information.While encryption only ...
    Covert channelNetwork steganographyPacket lengthNetwork securityInformation hidingNetwork protocols
  • [会议论文] ,2016 - 2016信息技术和机电一体化工程国际会议
      In recent years,computer viruses,Trojans,worms and hacker attacks are becoming increasingly popular.It has caused certain harm to the political,economic and social world,and poses a serious threat to...
    Security vulnerability databaseNVDCVEVulnerabilityNetwork Security
  • [会议论文] ,2016 - 2016 2nd International Conference on Mechanical, Electronic and Information Technology Engineering(2016机械、电子和信息技术国际会议)
      In recent years,due to the network virus,hacker is rampant which is a great threat to network security.This paper use features of the satellite modem construction the unidirectional physical transmis...
    Information interactionnetwork securityone-way transmission
  • [会议论文] ,2016 - 2016 2nd International Conference on Mechanical, Electronic and Information Technology Engineering(2016机械、电子和信息技术国际会议)
      In recent years,computer viruses,Trojans,worms and hacker attacks are becoming increasingly popular.It has caused certain harm to the political,economic and social world,and poses a serious threat to...
    Security vulnerability databaseNVDCVEVulnerabilityNetwork Security
  • [会议论文] ,2015 - 2015 Fifth International Conference on Instrumentation and Measurement,Computer,Communication and Control (IMCCC2015)(第五届仪器测量、计算机通信与控制国际会议)
      Given the lack of authentication mechanisms,the address resolution protocols (ARPs) (address resolution protocol,neighbor discovery protocol,and so on) are vulnerable to attack,such as man in the mid...
    Network securityAddress resolutionDuplicate address detectionUndecidabilityEquivalence
回到顶部
选择了条数据