期刊文献+

计算机网络风险防范措施及策略研究 被引量:4

Computer Networks and Strategies of Risk Prevention Measures
下载PDF
导出
摘要 全球信息化正以迅雷不及掩耳之势快速发展,而网络风险已成为信息化飞速发展过程中的一块绊脚石,越来越多的关注焦点集中在网络的安全问题上。我们在欢心于网络给这个社会带来的变化和成就时,也必须要客观、全面地看到它给我们带来的各种风险。本文分析了计算机网络风险的现状,并结合具体事例提出了网络风险防范措施及策略。 global information with lightning speed is the rapid development of the network risks the rapid development of information technology has become a stumbling block in the process,more and more attention focused on network security issues.We are in favor of the network changes brought to this community and achievements,they must be objective,and comprehensive that it has brought us a variety of risks.This paper analyzes the risk status of the computer network,and network with specific examples of proposed measures and risk prevention strategies.
出处 《信息安全与技术》 2011年第10期39-41,共3页
关键词 网络风险 防范 策略 network risk prevention strategy
  • 相关文献

参考文献2

二级参考文献10

  • 1[1]J. M. Bradshaw. An introduction to software agents [ M ]. Software Agents, chapter 1. AAAI Press aud MIT press, 1997.
  • 2[2]M.Crosbie, E.Spafford. Defending a computer system using autonomous agents[ A ]. In Proceedings of the 18th National Information System Security Conference[ C ], Ocotober 1995.
  • 3[3]D. Dasgupta. Immunity-based intrusion detection systems: A general framework[A]. In proceedings of the 22nd National Information Systems Security Conference(NISSC) [C],pages18-21, October 1999.
  • 4[4]P. Dhaeseleer. An immunological approach to change detection:Theoretical results[ A ]. In Proceedings of the 9th IEEE Computer Security Foundations Workshop[C], Los Alamitos, CA, 1996. IEEE Computer Society Press.
  • 5[5]S.A. Hofmeyr, S. Forrest. Architecture for an artificial immune system [ A].Evolutionary Computation[ C], 2000.
  • 6[6]J.H. Holl, K. J. Holyoak, R. E. Nisbett, et al. Introduction:Processes of inference [ A ], learning and discover [ C ]. MIT Press,Cambridge, MA, 1986.
  • 7[7]Intemet Security Systems. The ISS System Scanner[EB/OL],Available from http:∥www. iss. net.
  • 8[8]J.O. Kephart. A biologically inspired immune system for computers[A],R. A. Brooks, P. Maes, editors, Artificial Life. In Proceedings of the 4th Intemational Workshop on the Synthesis and Simulation of living Systems [C], pages 130-139.MIT Press, 1994.
  • 9[9]A. Somayaji,S.Hofmeyr, S. Forrest. Principles of a Computer Immune System[A]. 1997 New Security Paradigms Workshop[C], pages 75-82, ACM(1998).
  • 10彭杰.计算机网络安全问题的探讨[J].现代电子技术,2002,25(6):13-15. 被引量:11

共引文献12

同被引文献11

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部