期刊文献+

物联网计算机网络安全与远程控制技术研究 被引量:1

Research on Internet of Things Computer Network Security and Remote Control Technology
下载PDF
导出
摘要 在网络信息时代的大环境下,国内物联网技术水平得到了飞跃发展,在此过程中,人们对计算机网络安全与远程控制技术提出了更多的猜想。因此展开了对物联网计算机网络安全与远程控制技术的研究,通过概述物联网计算机网络安全与远程控制技术的内容及重要作用,然后分析当前国内该项技术的发展现状,最后根据现存的几类问题,提出了能够有效提高物联网计算机网络安全与远程控制技术水平的优化策略。 In the great environment of the network information age,the domestic Internet of Things technology level has been a leap forward development,in this process,people put forward more conjectures on the computer network security and remote control technology.This paper mainly studies the Internet of Things computer network security and remote control technology.Firstly,it summarizes the content and important role of the Internet of Things computer network security and remote control technology,and then analyzes the current domestic development status of this technology.Finally,according to the existing problems,it puts forward that the optimization strategy which can effectively improve the level of Internet of Things computer network security and remote control technology.
作者 张玥 胡璨 ZHANG Yue;HU Can(Yuzhong Branch of China Tower Co.,Ltd.,Chongqing 404100,China)
出处 《通信电源技术》 2020年第20期262-264,共3页 Telecom Power Technology
关键词 物联网 计算机 网络安全 远程控制技术 Internet of Things computer network security remote control technology
  • 相关文献

参考文献5

二级参考文献44

  • 1赖积保,王慧强,朱亮.网络安全态势感知模型研究[J].计算机研究与发展,2006,43(z2):456-460. 被引量:12
  • 2张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 3陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:342
  • 4Alhaami O H, Malaiya Y K, Ray I. Security vulnerabilities in software systems; A quantitative perspective [G]//LNCS 3654:Proc of the 19th Annual IFIP WG 11. 3 Working Conf on Data and Information Security. Berlin: Springer, 2005:281-294.
  • 5Alhazmi O H, Malaiya Y K, Ray I. Measuring, analyzing and predicting security vulnerabilities in software systems [J]. Computers & Security, 2007, 26(3), 219-228.
  • 6Kim J, Malaiya Y K, Ray I. Vulnerability discovery in multi- version software systems [C]//Proc of the 10th IEEE High Assurance Systems Engineering Syrup. Los Alamitos, CA: IEEE Computer Society, 2007:141-148.
  • 7Fava D S, Byers S R, Yang S J. Projecting cyberattacks through variable-length Markov models [J]. IEEE Trans on Information Forensics and Security, 2008, 3(3): 359-369.
  • 8Holsopple J, Yang S J, Sudit M. TANDI: Threat assessment for networked data and information [G] //SPIE 6242: Proe of Multisensor, Multisource Information Fusion:Architectures, Algorithms Bellingham, WA: SPIE, 2006 and Applications 2006: 1-11.
  • 9Mathew S, Shah C, Upadhyaya S. An alert fusion framework for situation awareness of coordinated multistage attacks [C] //Proc of the 3rd IEEE Int Workshop on Information Assurance. Los Alamitos, CA: IEEE Computer Society, 2005:95-104.
  • 10Yang S J, Byers S, Holscopple J, et al. Intrusion activity projection for cyber situational awareness [C]//Proe of IEEE Int Conf on Intelligence and Security Informatics. Piscataway, NJ: IEEE, 2008:167-172.

共引文献105

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部