期刊文献+

基于计算机网络防御策略求精模型的防入侵技术 被引量:8

原文传递
导出
摘要 面对日益丰富、技术精进的网络攻击手段与技术,如何保证资源的安全性,是基于策略网络管理中需要深入思考的问题。本文主要介绍了计算机网络防御求精模型以及算法,在此基础上对其关键技术的完善提出了相关的建议。
作者 邓家艺
出处 《网络安全技术与应用》 2016年第5期41-41,43,共2页 Network Security Technology & Application
  • 相关文献

参考文献3

二级参考文献48

  • 1胡寿松,徐德友,张敏.基于粗糙神经网络的歼击机操纵面智能故障诊断[J].南京师范大学学报(工程技术版),2004,4(3):1-6. 被引量:6
  • 2HU Y C,PERRIG A,JOHNSON D B.Rushing attacks and defense in wireless ad hoc network routing protocols[A].Proceedings of the 2003 ACM workshop on Wireless Scettrity[C].2003.30-40.
  • 3HU Y C,PERRIG A,JOHNSON D B.Ariadne:a secure on-demand muting protocol for ad hoc networks[J].Wireless Networks,2005,11(1):21-38.
  • 4CARVALHO M.Security in mobile ad hoc networks[J].IEEE Security & Privacy,2008,6(2):72-75.
  • 5DJENOURI D,KHELLADI L,BADACHE A N.A survey of security issues in mobile ad hoc and sensor networks[J].IEEE Communications Surveys & Tutorials,2005.7(4):2-28.
  • 6MARTI S,GIULITJ,LAIK et al.Mitigating muting misbehavior in mobile ad hoc networks[A].Proceedings of the 6th Annual Intemational Conference on Mobile Computing and Networking[C].2000.255-265.
  • 7BUCHEGGER S,BOUDEC J Y L.Performance analysis of the confidant protocol[A].Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing[C].2002.226-236.
  • 8MICHIARDI P,MOLVA R CORE:a collaborative reputation mechanism to enforce node cooperation mobile ad hoc networks[A].Proceedings of the IFIPTC6/TC11 Sixth Joint Working Conference On Communications and Multimedia Security[C].2002.107-121.
  • 9OLIVIERO F,ROMANO S P.A reputation-based metric for secure routing in wireless mesh networks[A].IEEE Global Telecommunications Conference[C].2008.1-5.
  • 10BALAKRISHNAN V,VADHARAJAN V,TUPAKULA U.Subjective logic based trust model for mobile ad hoc networks[A].Proceedings of the 4th Intemational Conferece on Security and Privacy in Communication Netowrks[C].2008.1-11.

共引文献23

同被引文献25

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部