Advanced security techniques for network protection

被引:1
|
作者
Merabti, M [1 ]
Shi, Q [1 ]
Oppliger, R [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 5UX, Merseyside, England
关键词
D O I
10.1016/S0140-3664(00)00243-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:1581 / 1583
页数:3
相关论文
共 50 条
  • [31] Security in Voip Network Using Neural Network and Encryption Techniques
    Galande, Ashwini
    Londhe, Dattatraya
    Balpande, Mangesh
    INFORMATION AND NETWORK TECHNOLOGY, 2011, 4 : 223 - 227
  • [32] Adaptive Optimization Techniques For Inteligent Network Security
    Trifonov, Roumen
    Tsochev, Georgi
    Pavlova, Galya
    Yoshinov, Radoslav
    Manolov, Slavcho
    2017 FOURTH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI), 2017, : 219 - 223
  • [33] Data correlation techniques in network security monitoring
    Priescu, Iustin
    Patriciu, Victor-Valeriu
    Nicolaescu, Sebastian
    5TH ROEDUNET IEEE INTERNATIONAL CONFERENCE, PROCEEDINGS, 2006, : 124 - 128
  • [34] Network Security in Big Data: Tools and Techniques
    Verma, Pushpak
    Chandra, Tej Bahadur
    Dwivedi, A. K.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, INDIA 2016, 2016, 433 : 255 - 262
  • [35] Enhancing Low-Voltage Distribution Network Safety through Advanced Residual Current Protection Techniques
    Zhang, Xinyi
    Liu, Yuanlong
    Han, Zhaoru
    Zhang, Hengxu
    APPLIED SCIENCES-BASEL, 2024, 14 (08):
  • [36] An Advanced Classification of Cloud Computing Security Techniques: A Survey
    Alturfi, Sabah M.
    Al-Musawi, Bahaa
    Marhoon, Haydar Abdulameer
    8TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST 2020), 2020, 2290
  • [37] Analyzing the Security Techniques used in LTE Advanced and their evaluation
    Rasheed, Iftikhar
    Amin, Asjad
    Chaudhary, Mahwish
    Bukhari, Sadaf
    Rizwan, Muhammad
    Ali, Kashif
    2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2013, : 11 - 13
  • [38] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [39] Network security protection technology for a cloud energy storage network controller
    Tao Yan
    Jialiang Liu
    Qianqian Niu
    Jizhong Chen
    Shaohua Xu
    Meng Niu
    Global Energy Interconnection, 2020, 3 (01) : 86 - 98
  • [40] Discussion and Practice of Computer Network Information and Network Security Protection Strategy
    Liu, Li
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1810 - 1813