期刊文献+

计算机网络技术的发展模式研究 被引量:11

The Research of Development Model for Computer Network Technology
下载PDF
导出
摘要 自从计算机网络技术诞生以来,该技术就对人们的生活和工作等各个方面产生了深刻的影响。基于此,我们界定了计算机网络技术的发展模式,阐述了计算机网络技术发展的三个阶段以及未来的发展趋势,探讨了计算机网络技术发展的动力因素。 Since the birth of computer network technology, the technology has a profound impact on people's lives and work and so on. Based on this, we define the development model of the computer network technology, describe the three stages of the development of the computer network technology and predict the future trend, explore the dynamic factors of the computer network technology.
作者 刘东鹏
出处 《价值工程》 2014年第4期209-210,共2页 Value Engineering
关键词 计算机网络技术 发展模式 发展阶段 动力因子 computer network technology development model development stage power factor
  • 相关文献

参考文献4

  • 1IoannisVotsis. Is structure not enough [J], Chicago:Philosophy of Science,2003(5):33-39.
  • 2MichaelHeim. Metaphysics of virtual reality [M]. OxfordUniversity Press, 1993:79-120.
  • 3程东.计算机网络与互联网技术研究应用和产业发展[J].科学新闻,2008(4):5-9.
  • 4吴金宇,金舒原,杨智.基于网络流的攻击图分析方法[J].计算机研究与发展,2011,48(8):1497-1505. 被引量:14

二级参考文献17

  • 1Lippmann R, Ingols K. An annotated review of past papers on attack graphs [R]. Lexington: MIT Lincoln Laboratory, 2005.
  • 2Phillips C, Swiler L. A graph based system for network vulnerability analysis [C] //Proc of the 1998 Workshop on New Security Paradigms. New York: ACM, 1998.
  • 3Swiler L, Phillips C, Ellis D, et al. Computer attack graph generation tool [C] //Proc of the 2nd DARPA Information Survivability Conf &Exposition. Los Alamitos: IEEE Computer Society, 2001: 307-321.
  • 4Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities [C]//Proe of the 2000 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society, 2000:156-165.
  • 5Sheyner O, Jha S, Wing J, et al. Automated generation and analysis of attack graphs [C] //Proc of the 2002 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society, 2002:273-284.
  • 6Ammann P, Wijesekera D, Kaushik S. Scalable, graph based network vulnerability analysis [C] //Proc of the 9th ACM Conf on Computer and Communications Security. New York: ACM, 2002:217-224.
  • 7Lippmann, R, Ingols K, Scott C, et al. Validating and restoring defense in depth using attack graphs [C]//Proc of the Military Corn Conf. Piscataway, NJ: IEEE., 2006:1-10.
  • 8Ingols K, Lippmann R, Piwowarski K. Practical attack graph generation for network defense [C] //Proc of the 22nd Annual Computer Security Applications Conf. Los Alamitos: IEEE Computer Society, 2006:121-130.
  • 9Qu X, Govindavajhala S, Appel A. MulVal:A logic-based network security analyzer [C] //Proc of the 14th USENIX Security Syrup. New York: ACM, 2005:113-128.
  • 10Ou X, Boyer W, McQueen M. A scalable approach to attack graph generation [C] //Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006:336-345.

共引文献13

同被引文献16

引证文献11

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部