The Application of IDS in College Library Network Security System

被引:0
|
作者
Huang Rugao [1 ]
机构
[1] Shandong Univ Technol, Zibo, Shandong, Peoples R China
关键词
The IDS; Network Security; College Library;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As a proactive security protection technology, Intrusion detection has been attached great importance to the people. This article discussed the functions and merits of the IDS, and analyzed its application in the library network security.
引用
收藏
页码:852 / 854
页数:3
相关论文
共 50 条
  • [21] NSDF:: a computer network system description framework and its application to network security
    Estévez-Tapiador, JM
    García-Teodoro, P
    Díaz-Verdejo, JE
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 573 - 600
  • [22] A network library system
    Namiki, I
    Kimeda, T
    Hayashi, H
    Kishida, Y
    Tachiyama, N
    Kanamaru, T
    Takeda, M
    Ohyama, M
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART I-COMMUNICATIONS, 2001, 84 (04): : 78 - 90
  • [23] Network library system
    Namiki, Ikuo
    Kimeda, Tsuneji
    Hayashi, Hiromichi
    Kishida, Yoshinori
    Tachiyama, Nobuhiro
    Kanamaru, Tetsuya
    Takeda, Masaru
    Ohyama, Minoru
    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi), 2001, 84 (04): : 78 - 90
  • [24] Application of computer network security technology for electric power system
    Zhu, Enguo
    Wu, Guoliang
    Yang, Gongxun
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 187 - 190
  • [25] Research on College English Teaching System Based on Resource Library and Network Support Platform
    Wei, Lu
    Liu, Binquan
    CYBER SECURITY INTELLIGENCE AND ANALYTICS, 2020, 928 : 1142 - 1149
  • [26] Construct Security Network based on Honeypot in Library
    Bai Rujiang
    Wang Xiaoyue
    Liao Junhua
    2010 SECOND ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2010, : 70 - 73
  • [27] THE 1986 COLLEGE LIBRARY STANDARDS - APPLICATION AND UTILIZATION
    WALCH, DB
    COLLEGE & RESEARCH LIBRARIES, 1993, 54 (03): : 217 - 226
  • [28] PCA-PSO-BP Neural Network Application in IDS
    Shi, Lan
    Yang, YanLong
    Lv, JanHui
    PROCEEDINGS OF THE 2015 INTERNATIONAL POWER, ELECTRONICS AND MATERIALS ENGINEERING CONFERENCE, 2015, 17 : 145 - 150
  • [29] Evolution of a security system in a small library
    Maxson, K
    IAMSLIC 2000: TIDES OF TECHNOLOGY, 2001, : 43 - 48
  • [30] Reinforcing Network Security by Converting Massive Data Flow to Continuous Connections for IDS
    Salem, Maher
    Buehler, Ulrich
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 570 - 575