期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
新时代下高校《计算机网络安全》课程教学优化策略
1
作者 杨喜艳 《中国科技经济新闻数据库 教育》 2024年第6期0160-0163,共4页
伴随着数字化时代步伐的加速前进,经济运行与社会发展高度依赖于网络与信息系统的支撑。如此一来,对网络安全提出的挑战便变得更为严峻。高等院校中设置《计算机网络安全》这门课程的重要性愈发凸显而出,随着网络技术的飞速进步以及其... 伴随着数字化时代步伐的加速前进,经济运行与社会发展高度依赖于网络与信息系统的支撑。如此一来,对网络安全提出的挑战便变得更为严峻。高等院校中设置《计算机网络安全》这门课程的重要性愈发凸显而出,随着网络技术的飞速进步以及其应用范围的不断扩大,网络安全威胁亦在同步增长之中。如黑客攻击、数据泄露、恶意软件以及网络诈骗等各种问题层出不穷,因此,提升网络安全防护技能方面的教育显得至关重要。 展开更多
关键词 新时代 高校 《计算机网络安全》 课程教学 改革
下载PDF
高校院校《计算机网络安全》课程基于实践教学方法的研究
2
作者 杨喜艳 《中文科技期刊数据库(文摘版)教育》 2024年第7期0005-0008,共4页
现阶段,随着互联网的发展和普及,计算机网络安全问题日益突出。在当前的教育环境下,高校计算机网络安全课程也面临着诸多挑战。网络安全课程是高校院校计算机专业教学应开设的一门重要课程,也是在计算机基础教学之上帮助学生增多网络技... 现阶段,随着互联网的发展和普及,计算机网络安全问题日益突出。在当前的教育环境下,高校计算机网络安全课程也面临着诸多挑战。网络安全课程是高校院校计算机专业教学应开设的一门重要课程,也是在计算机基础教学之上帮助学生增多网络技术实践的具体课程。因此,本文重点研究高校院校《计算机网络安全》课程基于实践教学方法,旨在提升学生计算机,促进学生全面发展。 展开更多
关键词 高校院校《计算机网络安全》课程基于 实践 教学方法
下载PDF
中职《计算机网络安全》课程教学策略探讨
3
作者 石磊 《电脑乐园》 2019年第10期147-147,共1页
随着素质教育的影响范围逐渐扩大,计算机技术已成为中职学生在接受教学过程中需要掌握的知识。本文通过着重探讨中职《计 算机网络安全》课程教学具体策略,分析该课程改革中需要注意的问题,以供参考。
关键词 中职 《计算机网络安全》课程 教学策略
下载PDF
信息安全视域下基于SDN技术的校园网络可靠性优化研究——评《计算机网络安全防护技术》 被引量:19
4
作者 宋凯 高冬冬 姜勇 《机械设计》 CSCD 北大核心 2020年第1期4-4,共1页
书名:计算机网络安全防护技术作者:秦燊劳翠金程钢出版社:西安电子科技大学出版社ISBN:9787560652986定价:43.00当前计算机网络与多媒体技术快速发展,尤其是多媒体网络技术在教学过程中应用越来越普遍,导致教育模式面临前所未有的变化,... 书名:计算机网络安全防护技术作者:秦燊劳翠金程钢出版社:西安电子科技大学出版社ISBN:9787560652986定价:43.00当前计算机网络与多媒体技术快速发展,尤其是多媒体网络技术在教学过程中应用越来越普遍,导致教育模式面临前所未有的变化,因此建设校园网络成为当前学校教学的重要基础。目前,校园网的网络特点主要有三个,分别是网络环境开放、用户群庞大和用户计算机系统无法实施统一管理,这些特点是造成校园网容易被攻击的主要原因。从整体来说,校园网络就是一个基本能覆盖整个校园范围的计算机局域网络群,即将校园内各个电子设备连接起来,通过指定出口连接到局域网和广域网之中,这些网络可以形成校园内部与内部、内部与外部之间的信息沟通载体. 展开更多
关键词 安全防护技术 校园网络 《计算机网络安全防护技术》 SDN 可靠性优化
下载PDF
《计算机网络安全基础》
5
作者 袁津生 《信息网络安全》 2003年第3期35-35,共1页
关键词 《计算机网络安全基础》 网络安全 书评 计算机网络
下载PDF
广东省计算机信息系统安全保护管理规定
6
《信息网络安全》 2003年第7期18-19,共2页
第一条为了保护计算机信息系统的安全,促进信息化建设的健康发展,根据<中华人民共和国计算机信息系统安全保护条例>和<计算机信息网络国际联网安全保护管理办法>规定,结合本省实际,制定本规定.
关键词 计算机 信息系统 信息安全《计算机信息网络国际联网安全保护管理办法》 广东
下载PDF
Research and Implementation on HTTP Tunneling
7
作者 束坤 许勇 +1 位作者 吴国新 赵齐 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期52-57,共6页
The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i... The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i.e, adding local proxy to browser and reverse proxy to Web server based on present Web browser and server. The transformation between HTTP message and secure HTTP message is implemented in these two proxy modules. The architecture and implementing method is given and the features of this module is also discussed. 展开更多
关键词 computer network WEB communication security PROXY
下载PDF
Improved Feistel-based ciphers for wireless sensor network security 被引量:3
8
作者 Tamara PAZYNYUK George S. OREKU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1111-1117,共7页
Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accor... Wireless sensor networks (WSNs) are exposed to a variety of attacks. The quality and complexity of attacks are rising day by day. The proposed work aims at showing how the complexity of modern attacks is growing accordingly, leading to a similar rise in methods of resistance. Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms. We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme. The modified accelerated-cipher design uses data-dependent permutations, and can be used for fast hardware, firmware, software and WSN encryption systems. The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES, Camellia and so on. 展开更多
关键词 SECURITY CIPHER Wireless sensor network (WSN) Feistel scheme
下载PDF
Security enhancement of WAPI access authentication protocol (WAI) 被引量:2
9
作者 刘永磊 金志刚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期42-46,共5页
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o... In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd 展开更多
关键词 WLAN WLAN Authentication and Privacy Infrastructure Colored Petri Nets CK model
下载PDF
Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1
10
作者 孙道清 曹奇英 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific... Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. 展开更多
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY
下载PDF
Contrastive Analysis of Software Networks Based on Different Coupling Relationships 被引量:3
11
作者 XU Guoai GAO Yang +2 位作者 QI Yana PENG Junhao TANG Xianjing 《China Communications》 SCIE CSCD 2010年第4期76-82,共7页
Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analy... Several software network models are constructed based on the relationships between classes in the object-oriented software systems.Then,a variety of well-known open source software applications are statistically analyzed by using these models.The results show that: (1) Dependency network does play a key role in software architecture;(2) The exponents of in-degree and total-degree distribution functions of different networks differ slightly,while the exponent of out-degree varies obviously;(3) Weak-coupling relationships have greater impact on software architecture than strong-coupling relationships.Finally,a theoretically analysis on these statistical phenomena is proposed from the perspectives of software develop technology,develop process and developer’s habits,respectively. 展开更多
关键词 Software System Software Networks Coupling Relationship Degree Distribution
下载PDF
A Secure Trust Model for P2P Systems Based on Trusted Computing 被引量:1
12
作者 郝黎明 杨树堂 +1 位作者 陆松年 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期86-90,共5页
Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworth... Trust is one of the most important security requirements in the design and implementation of peer-to-peer (P2P) systems. In an environment where peers' identity privacy is important, it may conflict with trustworthiness that is based on the knowledge related to the peer's identity, while identity privacy is usually achieved by hiding such knowledge. A trust model based on trusted computing (TC) technology was proposed to enhance the identity privacy of peers during the trustworthiness evaluation process between peers from different groups. The simulation results show that, the model can be implemented in an efficient way, and when the degree of anonymity within group (DAWG) is up to 0.6 and the percentage of malicious peers is up to 70%7 the service selection failure rate is less than 0.15. 展开更多
关键词 PEER-TO-PEER trust model trusted computing direct anonymous attestation pseudonym
下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
13
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network SECURITY reliability
下载PDF
Personalized Trust Management for Open and Flat P2P Communities
14
作者 左敏 李建华 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期527-532,共6页
A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trus... A personalized trust management scheme is proposed to help peers build up trust between each other in open and flat P2P communities. This scheme totally abandons the attempt to achieve a global view. It evaluates trust from a subjective point of view and gives personalized decision support to each peer. Simulation experiments prove its three advantages: free of central control, stronger immunity to misleading recommendations, and limited traffic overload. 展开更多
关键词 P2P trust management DHT collaborative filtering
下载PDF
Application of detecting algorithm based on network
15
作者 张凤斌 杨永田 +1 位作者 江子扬 孙冰心 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期275-280,共6页
Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithm... Because currently intrusion detection systems cannot detect undefined intrusion behavior effectively, according to the robustness and adaptability of the genetic algorithms, this paper integrates the genetic algorithms into an intrusion detection system, and a detection algorithm based on network traffic is proposed. This algorithm is a real-time and self-study algorithm and can detect undefined intrusion behaviors effectively. 展开更多
关键词 network security intrusion detection ANOMALY
下载PDF
A More Efficient Group Key Distribution Scheme for Wireless Ad hoc Networks
16
作者 李晖 陈克非 +1 位作者 温蜜 郑燕飞 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期64-66,共3页
As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless app... As the wireless medium is characterized by its lossy nature, reliable communication cannot be assumed in the key management scheme. Therefore self-healing is a good property for key distribution scheme in wireless applications. A new self-healing key distribution scheme was proposed, which is optimal in terms of user memory storage and efficient in terms of communication complexity. 展开更多
关键词 group key ad hoc network SECURITY
下载PDF
Research on computer network security measures
17
作者 CHEN Jie 《International English Education Research》 2015年第10期1-3,共3页
With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security is... With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security issues have received more and more attention of the communities. In the face of the problems of the security hidden trouble in the computer network, it is essential to take the relevant measures to ensure the safety of the computer network. With the computer network security as the breakthrough point, this paper discusses the precautionary measures of the computer network security based on the analysis of the computer network security, in order to illustrate the importance of the computer network security, to provide references for ensuring the security of the computer network. 展开更多
关键词 COMPUTER network security PROBLEM precautionary measures
下载PDF
Design and Implementation of Security Solution for Computer Network
18
作者 Lihui SONG Haicun ZHAO 《International Journal of Technology Management》 2015年第5期75-78,共4页
This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, ... This article analyzes the problem of computer network security, and design scheme of the network security system. The scheme uses advanced network security technologies, includes a complete set of physical isolation, desktop system security, virus protection, identity authentication, access control, information encryption, message integrity check, non-repudiation, security audit, intrusion detection, vulnerability scanning, electromagnetic leakage emission protection, security management and other security technology and management measures, the purpose is to establish a complete, multi-level three-dimensional, network security defense system. 展开更多
关键词 Network security FIREWALL Intrusion detection Security audit
下载PDF
AN ADAPTIVE-WEIGHTED TWO-DIMENSIONAL DATA AGGREGATION ALGORITHM FOR CLUSTERED WIRELESS SENSOR NETWORKS
19
作者 Zhang Junhu Zhu Xiujuan Peng Hui 《Journal of Electronics(China)》 2013年第6期525-537,共13页
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t... In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network. 展开更多
关键词 Data aggregation Adaptive-weighted aggregation Clustered Wireless Sensor Networks(WSNs) Linear regression Data accuracy Energy consumption Lempel-Ziv-Welch (LZW)
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
20
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部