期刊文献+
共找到191篇文章
< 1 2 10 >
每页显示 20 50 100
云时代下需防范金融网络安全风险 被引量:2
1
作者 魏攀 《当代县域经济》 2015年第10期78-79,共2页
随着云时代的到来和智能手机、平板电脑等终端产品的普及,方便了人们的生活,但网络安全问题也随之而来。而银行,掌握着大量的客户信息资源,同时拥有着传统业务和各种电子银行类的创新产品,与金融网络安全息息相关。农村信用社,作为服务&... 随着云时代的到来和智能手机、平板电脑等终端产品的普及,方便了人们的生活,但网络安全问题也随之而来。而银行,掌握着大量的客户信息资源,同时拥有着传统业务和各种电子银行类的创新产品,与金融网络安全息息相关。农村信用社,作为服务"三农"的主力军,随着业务不断发展,在保持传统业务的基础上相继推出了银行卡、自助银行服务、网上银行、网上支付、电话银行、手机银行等互联网金融创新业务,并迅速积累了大量的网络客户。 展开更多
关键词 云时代 网络安全风险 农村信用社 客户信息 金融网络 网络客户 声誉风险 动态口令 平板电脑 网络安
下载PDF
安信通掀起网络安全市场的浪花
2
作者 郭世权 《信息安全与通信保密》 2003年第10期73-73,共1页
关键词 北京信通网络技术有限公司 网络安 HA20X物理隔离系统 控制系统 渠道分销体系
原文传递
网络化视频安防监控系统在西藏人民广播电台播出区的应用
3
作者 蒋秋香 《西部广播电视》 2017年第21期203-203,205,共2页
网络化视频监控系统在安全防范中起着重要作用,本文主要介绍西藏人民广播电台2017年播控系统改造升级后启用的i VMS-4200安防监控系统的主要组成结构、特点及在西藏人民广播电台的应用。
关键词 网络化视频监控防系统 全防范 升级改造
下载PDF
移动Agent在IDS中的应用及其安全性研究
4
作者 谷雨 范菁 +1 位作者 杨柽 夏姜虹 《云南民族大学学报(自然科学版)》 CAS 2005年第1期86-88,共3页
 传统的入侵检测系统(IDS)受环境因素与技术因素的影响很大,而移动Agent具有迁移性、智能性、协作性和分布灵活性,可以按照系统和网络异常使用模式的不同特征和环境差异进行检测,更准确地把握入侵行为.现对移动Agent在入侵检测系统中...  传统的入侵检测系统(IDS)受环境因素与技术因素的影响很大,而移动Agent具有迁移性、智能性、协作性和分布灵活性,可以按照系统和网络异常使用模式的不同特征和环境差异进行检测,更准确地把握入侵行为.现对移动Agent在入侵检测系统中的应用进行了研究,并对移动Agent本身的安全性问题进行了讨论. 展开更多
关键词 移动AGENT IDS 入侵检测系统 全性 网络安 计算机
下载PDF
网络犯罪相关罪名法律适用问题研究 被引量:10
5
作者 张慧 《现代法学》 CSSCI 北大核心 2019年第4期156-167,共12页
为更好地防范和打击网络违法犯罪行为,我国刑事立法进一步拓宽了网络犯罪的刑法打击范围。如何实现新增罪名的准确适用是当前的重要问题。关于非法利用信息网络罪,要注意对行为方式和'情节严重'的把握,关于帮助信息网络犯罪活动... 为更好地防范和打击网络违法犯罪行为,我国刑事立法进一步拓宽了网络犯罪的刑法打击范围。如何实现新增罪名的准确适用是当前的重要问题。关于非法利用信息网络罪,要注意对行为方式和'情节严重'的把握,关于帮助信息网络犯罪活动罪,需要加强对'明知'和'情节严重'的认知;关于拒不履行信息网络安全管理义务罪,要注意对信息网络安全管理义务的范畴和监管部门的范围与层级予以明确。 展开更多
关键词 非法利用信息网络 帮助信息网络犯罪活动罪 拒不履行信息网络安
下载PDF
城市广电融媒体平台的安全策略分析 被引量:2
6
作者 杨景华 《电视技术》 2019年第20期32-33,44,共3页
本文从城市广电融媒体平台隐藏的网络安全隐患的实际出发,提出了城市广电融媒体网络平台所面临安全问题,分析与探讨了城市广电融媒体网络平台安全策略。
关键词 网络安 融媒体 网络攻击 全策略
下载PDF
福建省人民政府办公厅关于加强我省政府类互联网站安全管理的通知
7
《福建省人民政府公报》 2007年第29期40-40,43,共2页
各市、县(区)人民政府,省人民政府各部门、各直属机构:为加强我省政府类互联网站的安全管理,确保网站健康有序发展,现就加强我省政府类互联网站安全管理工作通知如下:一、要高度重视网站安全管理工作各级各单位要高度重视信息安全工作,... 各市、县(区)人民政府,省人民政府各部门、各直属机构:为加强我省政府类互联网站的安全管理,确保网站健康有序发展,现就加强我省政府类互联网站安全管理工作通知如下:一、要高度重视网站安全管理工作各级各单位要高度重视信息安全工作,把信息安全放到至关重要的位置上,切实加强本单位互联网站的安全管理,正确处理好安全与发展的关系,按照以发展求安全。 展开更多
关键词 互联网站 信息 工作通知 直属机构 网站 网络与信息 全技术措施 网络安全漏洞 信息网络安
下载PDF
学校信息技术网络建设与资源管理
8
作者 魏学锦 《现代教育科学(小学校长)》 2008年第4期106-107,共2页
目前,信息技术逐步成为生产力的重要组成部分,但小学信息技术的发展还处于初级阶段,为使学校在信息技术方面赶上时代的步伐,应在网络建设、制度化管理、网络安全管理、信息资源管理等几方面进行探究,充分发挥校园网络的作用,提高... 目前,信息技术逐步成为生产力的重要组成部分,但小学信息技术的发展还处于初级阶段,为使学校在信息技术方面赶上时代的步伐,应在网络建设、制度化管理、网络安全管理、信息资源管理等几方面进行探究,充分发挥校园网络的作用,提高校园网络的功能与效益。 展开更多
关键词 信息技术 网络建设 网络安管理 资源管理 制度化管理
下载PDF
面向流管理的哈希算法研究 被引量:11
9
作者 陈一骄 卢锡城 孙志刚 《计算机工程与科学》 CSCD 2008年第4期26-29,共4页
网络流的识别与管理在网络应用中有着重要作用。但是,随着网络链路速度的迅速提高,流管理变得越来越困难。哈希算法由于其常量查找时间和存储开销小的特点而具有很好的实用价值。本文首先提出了衡量流管理哈希算法性能的标准,然后提出... 网络流的识别与管理在网络应用中有着重要作用。但是,随着网络链路速度的迅速提高,流管理变得越来越困难。哈希算法由于其常量查找时间和存储开销小的特点而具有很好的实用价值。本文首先提出了衡量流管理哈希算法性能的标准,然后提出了一个CRC20的哈希算法,并从理论与模拟实验两方面将它与其它几种哈希算法进行了对比,证明了所提出的CRC20算法具有较好的计算性能和很好的访存性能,适合高速网络链路中的流管理应用。 展开更多
关键词 流管理 哈希算法 网络安 CRC算法
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
10
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
The Application of Weighted Association Rules in Host-Based Intrusion Detection System 被引量:1
11
作者 曹元大 薛静锋 《Journal of Beijing Institute of Technology》 EI CAS 2002年第4期418-421,共4页
Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weight... Association rules are useful for determining correlations between items. Applying association rules to intrusion detection system (IDS) can improve the detection rate, but false positive rate is also increased. Weighted association rules are used in this paper to mine intrustion models, which can increase the detection rate and decrease the false positive rate by some extent. Based on this, the structure of host-based IDS using weighted association rules is proposed. 展开更多
关键词 network security intrusion detection system association rules WEIGHT
下载PDF
A Smooth Expansion Model for PKI 被引量:1
12
作者 龚俭 刘建航 《Journal of Southeast University(English Edition)》 EI CAS 2000年第1期1-5,共5页
The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and managemen... The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services. 展开更多
关键词 network security key certificate CA PKI path discovery
下载PDF
Anomaly detection for network traffic flow 被引量:2
13
作者 单蓉胜 李建华 王明政 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期16-20,共5页
This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-att... This paper presents a mechanism for detecting flooding-attacks. The simplicity of the mechanism lies in its statelessness and low computation overhead, which makes the detection mechanism itself immune to flooding-attacks. The SYN-flooding, as an instance of flooding-attack, is used to illustrate the anomaly detection mechanism. The mechanism applies an exponentially weighted moving average (EWMA) method to detect the abrupt net flow and applies a symmetry analysis method to detect the anomaly activity of the network flow. Experiment shows that the mechanism has high detection accuracy and low detection latency. 展开更多
关键词 INTERNET
下载PDF
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
14
作者 任勇军 王建东 +1 位作者 徐大专 庄毅 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2009年第4期313-319,共7页
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ... The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single unified security model is essential, The eCK , eCK and CK models are examined and the result is proved that the eCK' model is the strongest provable security model for the key exchange. The relative security strength among these models is analyzed. To support the implication or non-implication relations among these models, the formal proofs and the counter-examples are given. 展开更多
关键词 network security CRYPTOGRAPHY information security key exchange protocol
下载PDF
Optimization and coordination model of information system security investment for interdependent risk
15
作者 顾建强 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2015年第2期288-293,共6页
The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium lev... The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare. 展开更多
关键词 interdependent risk cyber security insurance SELF-PROTECTION COORDINATION
下载PDF
STUDY ON SEAMLESS AND MULTILEVEL VPN
16
作者 陈兵 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2002年第2期182-186,共5页
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ... The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control. 展开更多
关键词 network security virtual private network FIREWALLS
下载PDF
Research and Implementation on HTTP Tunneling
17
作者 束坤 许勇 +1 位作者 吴国新 赵齐 《Journal of Southeast University(English Edition)》 EI CAS 2000年第2期52-57,共6页
The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i... The security problem of the Web system in the Internet based Intranet and the shortcomings of the methods used in solving this problem are analyzed and our system model of Web communication security are discussed, i.e, adding local proxy to browser and reverse proxy to Web server based on present Web browser and server. The transformation between HTTP message and secure HTTP message is implemented in these two proxy modules. The architecture and implementing method is given and the features of this module is also discussed. 展开更多
关键词 computer network WEB communication security PROXY
下载PDF
Applying Hopfield neural networkto QoSroutingin communication network
18
作者 HOU Jian SHEN Jin-yuan +1 位作者 CHANG Sheng-jiang ZHANG Yan-xin 《Optoelectronics Letters》 EI 2005年第3期217-220,共4页
The main goal of routing solutions is to satisfy the requirements of the Quality of Service (QoS) for every admitted connection as well as to achieve a global efficiency in resource utilization.In this paper proposes ... The main goal of routing solutions is to satisfy the requirements of the Quality of Service (QoS) for every admitted connection as well as to achieve a global efficiency in resource utilization.In this paper proposes a solution based on Hopfield neural network (HNN) to deal with one of representative routing problems in uni-cast routing,i.e.the multi-constrained(MC) routing problem.Computer simulation shows that we can obtain the optimal path very rapidly with our new Lyapunov energy functions. 展开更多
关键词 通信网络 神经网络 邮件路由 网络安 服务质量
下载PDF
The Study of Farmland Information Management System based on Wireless Sensor Networks 被引量:2
19
作者 余华 吕宁波 《Agricultural Science & Technology》 CAS 2010年第7期183-185,188,共4页
To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t... To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning. 展开更多
关键词 Wireless Sensor Network System structure Energy control System safety
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
20
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部