期刊文献+

网络技术发展模式探讨

原文传递
导出
摘要 0引言 计算机网络技术需要多种相关技术的支持,为了让网络互联工作的更稳定,网络技术在进入新世纪后也取得了快速的发展。笔者在本文中首先介绍了计算机网络技术,接着对其发展的模式进行了界定,其后对计算机网络技术的发展阶段进行了分析,最后对它未来的发展趋势进行了展望,以期让计算机网络技术可以更好地发展,更好地服务于人类社会。
作者 孙晓罡
出处 《网络安全技术与应用》 2015年第10期11-12,共2页 Network Security Technology & Application
  • 相关文献

参考文献2

二级参考文献17

  • 1Lippmann R, Ingols K. An annotated review of past papers on attack graphs [R]. Lexington: MIT Lincoln Laboratory, 2005.
  • 2Phillips C, Swiler L. A graph based system for network vulnerability analysis [C] //Proc of the 1998 Workshop on New Security Paradigms. New York: ACM, 1998.
  • 3Swiler L, Phillips C, Ellis D, et al. Computer attack graph generation tool [C] //Proc of the 2nd DARPA Information Survivability Conf &Exposition. Los Alamitos: IEEE Computer Society, 2001: 307-321.
  • 4Ritchey R, Ammann P. Using model checking to analyze network vulnerabilities [C]//Proe of the 2000 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society, 2000:156-165.
  • 5Sheyner O, Jha S, Wing J, et al. Automated generation and analysis of attack graphs [C] //Proc of the 2002 IEEE Syrup on Security and Privacy. Los Alamitos: IEEE Computer Society, 2002:273-284.
  • 6Ammann P, Wijesekera D, Kaushik S. Scalable, graph based network vulnerability analysis [C] //Proc of the 9th ACM Conf on Computer and Communications Security. New York: ACM, 2002:217-224.
  • 7Lippmann, R, Ingols K, Scott C, et al. Validating and restoring defense in depth using attack graphs [C]//Proc of the Military Corn Conf. Piscataway, NJ: IEEE., 2006:1-10.
  • 8Ingols K, Lippmann R, Piwowarski K. Practical attack graph generation for network defense [C] //Proc of the 22nd Annual Computer Security Applications Conf. Los Alamitos: IEEE Computer Society, 2006:121-130.
  • 9Qu X, Govindavajhala S, Appel A. MulVal:A logic-based network security analyzer [C] //Proc of the 14th USENIX Security Syrup. New York: ACM, 2005:113-128.
  • 10Ou X, Boyer W, McQueen M. A scalable approach to attack graph generation [C] //Proc of the 13th ACM Conf on Computer and Communications Security. New York: ACM, 2006:336-345.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部