共 50 条
- [31] Analysis of network security requirement and security policy research 2000, Shanghai Comp Soc, China (26):
- [33] NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY* JOURNAL OF INDUSTRIAL ECONOMICS, 2010, 58 (04): : 868 - 894
- [35] Transparent network security policy enforcement USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2000, : 215 - 225
- [37] Security policy for personal network terminal 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS: II, 2003, : 356 - 361
- [38] Security Engine Management of Router based on Security Policy PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 116 - 119
- [40] Automatic Network Reconfiguration because of Security Events 2014 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2014,