Security and the enterprise network

被引:0
|
作者
Banes, David [1 ]
机构
[1] 3Com's Premises Distribution Div, Hemel Hempstead, United Kingdom
关键词
2;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:198 / 206
相关论文
共 50 条
  • [21] Application of Virtual Honeypot on the Mining Enterprise Network Security
    Liu, Haibo
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [22] Application of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
    Chen, Xun
    Xu, Lisheng
    Xu, Meng
    IAEDS15: INTERNATIONAL CONFERENCE IN APPLIED ENGINEERING AND MANAGEMENT, 2015, 46 : 1261 - 1266
  • [23] Analysis of Network Security in Electric Power Enterprise and Its Countermeasures
    Zhu Enguo
    Zhao Bing
    Wu Guoliang
    Yang Gongxun
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 711 - 714
  • [24] Stochastic game net and applications in security analysis for enterprise network
    Wang, Yuanzhuo
    Yu, Min
    Li, Jingyuan
    Meng, Kun
    Lin, Chuang
    Cheng, Xueqi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (01) : 41 - 52
  • [25] Design and Implementation of Enterprise Network Security System Based on Firewall
    Yuan, Hui
    Zheng, Lei
    Qiu, Shuang
    Peng, Xiangli
    Liang, Yuan
    Hu, Yaodong
    Deng, Guoru
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1070 - 1078
  • [26] security and seamless mobility based architecture for hybrid network of enterprise
    Zhao, Jingling
    Pan, Jinjun
    Hou, Liming
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4603 - +
  • [27] Network gateway security method for enterprise Grid: a literature review
    Sujarwo, A.
    Tan, J.
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND DIGITAL APPLICATIONS, 2017, 185
  • [28] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [29] Network Security Risk Assessment Based on Enterprise Environment Characteristics
    Yang, Yunxue
    Yang, Zhenqi
    Yang, Qin
    Ji, Guohua
    Xue, Shengjun
    International Journal of Network Security, 2022, 24 (01) : 156 - 165
  • [30] Correlation based Node Behavior Profiling for Enterprise Network Security
    Chang, Su
    Daniels, Thomas E.
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 298 - 305