期刊文献+

网络安全技术探究

Research on the Network Security Technology
下载PDF
导出
摘要 阐述了在计算机网络环境下的安全技术,说明了网络攻击者所采取的手段,并且对防火墙进行了分析,论述了信息安全体系的元素。 This paper introduces the computer network environment of security technology,that the network to attack the means,and for firewall,and discussed the information security system elements.
作者 李凌莉
出处 《软件导刊》 2012年第6期140-141,共2页 Software Guide
关键词 网络安全 网络攻击 计算机 安全技术 Linux Teaching Content The Course System Teaching Methods Mission Driving Method
  • 相关文献

参考文献5

二级参考文献18

  • 1焦李成.神经网络系统理论[M].西安:西安电子工业大学出版社,1993.268-280.
  • 2Dutta S,Shekhar S.Bond rating:a non-conservative application of neural networks[J].Proc IEEE Int Cont on Neural Networks,1988;(2): 443 -450.
  • 3Saaty T L.The Analytic Hierarchy Process[M].New York:McGraw- Hill, 1980.
  • 4许树柏.层次分析原理[M].天津:天津大学出版社,1988..
  • 5连一峰.基于遗传神经网络的入侵检测系统[D].成都:成都理工大学,2003,6.
  • 6Common intrusion detection framework[EB/OL].[2002].http://www.isi. edu/gost/cidf/.
  • 7Bace R,Mell P.National Institute of Standards and Technology. Intrusion detection systems:NIST Special Publication on Intrusion Detection Systems, 2000: 76-79.
  • 8Fox K L,Henning R R,Reed J H,et al.A neural network approach towards intrusion detection [C]//Proceedings of the 13th National Computer Security Conference, 1990:125-134.
  • 9Tan K.The application of neural networks to UNIX computer security[C]//Proceedings of the IEEE International Conference on Neural Networks, 1995, 1:476-481.
  • 10Kumar G P,Venkateram P.Security management architecture for access control to network resourees[J].IEE Proceedings on Computers and Digital Techniques, 1997; 144(6) :362-370.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部