共 50 条
- [1] Security evaluation method based on real time traffic of hosts [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2006, 40 (04): : 415 - 419
- [2] Manipulation of Network Traffic Traces for Security Evaluation [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 1124 - +
- [3] Network Security: Approach Based on Network Traffic Prediction [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 41 - 55
- [4] Research on the design of network security situation sensor based on network traffic [J]. Boletin Tecnico/Technical Bulletin, 2017, 55 (07): : 554 - 561
- [5] The Study on Network Security Strategy based on Security Evaluation [J]. COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 446 - 450
- [7] Security evaluation of computer network based on hierarchy [J]. International Journal of Network Security, 2019, 21 (05): : 735 - 740
- [8] Network Security Architecture Based on Vulnerability Evaluation [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
- [9] Attack graph based evaluation of network security [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227