期刊文献+
共找到3,579篇文章
< 1 2 179 >
每页显示 20 50 100
Analysis of Campus Network Security
1
作者 Han Chu Haoliang Lan +1 位作者 Jie Xu Xiao Feng Sun 《Journal of New Media》 2022年第4期219-229,共11页
Campus network provides a critical stage to student service and campus administration,which assumes a paramount part in the strategy of‘Rejuvenating the Country through Science and Education’and‘Revitalizing China ... Campus network provides a critical stage to student service and campus administration,which assumes a paramount part in the strategy of‘Rejuvenating the Country through Science and Education’and‘Revitalizing China through Talented Persons’.However,with the rapid development and continuous expansion of campus network,network security needs to be an essential issue that could not be overlooked in campus network construction.In order to ensure the normal operation of various functions of the campus network,the security risk level of the campus network is supposed to be controlled within a reasonable range at any moment.Through literature research,theory analysis and other methods,this paper systematically combs the research on campus network security at home and abroad,analyzing and researching the campus network security issues from a theoretical perspective.A series of efficient solutions accordingly were also put forward. 展开更多
关键词 INTERNET campus network network security protective measures
下载PDF
Application Research of Computer Network Technology in Mining Railway Transport Management System 被引量:2
2
作者 余静 王振军 才庆祥 《Journal of China University of Mining and Technology》 2002年第1期57-60,共4页
This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development conditi... This paper discussed the necessity of establishing a computer network in a mining railway transport management system. The network structure and the system security design, associated with the real development condition of a mining area, were brought forward, and the system evaluation was given. 展开更多
关键词 mining railway transport management computer network security reliability
下载PDF
On the maintenance management and the network security of the Computer Local Area Network
3
《International English Education Research》 2013年第12期72-74,共3页
With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions ... With the development of the science and technology of the computer application, the maintenance management and the security of the computers is an important problem. In this paper the author presents his own opinions on these issues. Therefore, the maintenance management of the computer local area network is very important to guarantee the security and stability of the network and to the use of the cyber sources to a maximum. 展开更多
关键词 LAN COMPUTER maintenance management network security
下载PDF
Research on Heterogeneous Network Security Devices
4
作者 Yishui Lin Tingting Yu 《International Journal of Technology Management》 2013年第3期23-27,共5页
With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to de... With the continuous development of network applications, network security equipment type and the number of growing, heterogeneous security devices is difficult synergistic, massive alarm information is difficult to deal and the lack of an effective response to the treatment process as well as on security incidents. To solve these problems, the proposed design of a unified management platform for a variety of heterogeneous network security equipment. A brief introduction for the main functions of the platform.The article proposed a traffic handling mechanisms of heterogeneous security devices, allowing the platform to support heterogeneous security devices. 展开更多
关键词 heterogeneous networks security management security equipment
下载PDF
Vulnerability impact analysis framework for network security
5
作者 ZHENG Gu-ping ZHANG Wen-hao 《通讯和计算机(中英文版)》 2007年第8期24-28,共5页
关键词 网络安全 计算机网络 弱点 攻击分析 网络管理 赋值
下载PDF
On an Interactive Network Security Measure
6
作者 罗惠琼 王佳昊 赵强 《Journal of Electronic Science and Technology of China》 2004年第1期35-37,共3页
An interactive network security measure and a description of its function as well as its principle are presented. Based on the existing security loopholes and bugs in operating systems, this measure focuses on the res... An interactive network security measure and a description of its function as well as its principle are presented. Based on the existing security loopholes and bugs in operating systems, this measure focuses on the restrictive condition of security and the establishment of configuration files. Under the control and administration of the secure management of configuration files, each system module brings much flexibility, adaptability and high-level security. The security detecting and managing software used in UNIX based on this measure has obtained good results, achieving the goal of automatically detecting and handling inner and outer system-violation and system abuse. 展开更多
关键词 network security UNIX security management configuration files
下载PDF
Design and Implementation of Trusted-Router Based on Trust Management System
7
作者 孙斌 毛元奎 《China Communications》 SCIE CSCD 2011年第5期63-69,共7页
This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its... This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its trust value,which is the quantification of the network's expectation for this packet's and its owner's behavior in the network.We outline the algorithms to calculate the trust value of the trusted-router and the IP packet.We also introduce the trust-based QoS management algorithm and the deployment of the trusted-routers which carry out this algorithm.The simulation results show that the least trusted IP packets will be dropped to save resources for those highly trusted IP packets.This will ecourage all the elements in the network to keep a good trust record. 展开更多
关键词 network security trust management trust algorithm trusted router QOS
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
8
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
9
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
Cost management based security framework in mobile ad hoc networks
10
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 network attacks Mobile ad hoc Cost management security framework
下载PDF
Security Management Measures for Library Computer Network
11
作者 Jie Li 《Journal of Contemporary Educational Research》 2019年第4期71-75,共5页
Informationization and automation are important in library management due to the development of computer technology and network technology.Although computer networks bring great convenience and improvement to library ... Informationization and automation are important in library management due to the development of computer technology and network technology.Although computer networks bring great convenience and improvement to library management’s efficiency and quality,there are many security issues that could tag along with networks.The library information is prone to leak due to virus and hackers as well as the transparency of the network.Thus,this leads to a high security risk in library management.Therefore,this paper mainly analyses the security management strategies of library computer networks. 展开更多
关键词 LIBRARY COMPUTER network security management COUNTERMEASURE
下载PDF
Information Security Management Measures for College Archives Under the Network Environment
12
作者 Litao Cui 《Journal of Electronic Research and Application》 2022年第6期15-19,共5页
The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelera... The construction of archives in colleges and universities in China is in the process of development and improvement.With the development information technology,the informatization of college archives has been accelerated.Network technology is developing rapidly in our country,and the number of network users has increased significantly.The use of network technology in university archives management can improve the management efficiency and quality of archives,but the safety factor has dropped significantly.For example,the archival system may face many problems such as virus infection,system paralysis,or cyberattacks,which affects the security of the university archives.Therefore,this paper presents an analysis of these problems in detail,and proposes corresponding solutions,so as to optimize and improve the information security management of college archives. 展开更多
关键词 network environment University archives Information security management
下载PDF
TRUSED:A Trust-Based Security Evaluation Scheme for A Distributed Control System
13
作者 Saqib Ali Raja Waseem Anwar 《Computers, Materials & Continua》 SCIE EI 2023年第2期4381-4398,共18页
Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they off... Distributed control systems(DCS)have revolutionized the communication process and attracted more interest due to their pervasive computing nature(cyber/physical),their monitoring capabilities and the benefits they offer.However,due to distributed communication,flexible network topologies and lack of central control,the traditional security strategies are inadequate formeeting the unique characteristics ofDCS.Moreover,malicious and untrustworthy nodes pose a significant threat during the formation of a DCS network.Trust-based secure systems not only monitor and track the behavior of the nodes but also enhance the security by identifying and isolating the malicious node,which reduces the risk and increases network lifetime.In this research,we offer TRUSED,a trust-based security evaluation scheme that both,directly and indirectly,estimates each node’s level of trustworthiness,incorporating the cumulative trust concept.In addition,simulation results show that the proposed technique can effectively identify malicious nodes,determine their node’s trustworthiness rating,and improve the packet delivery ratio. 展开更多
关键词 MALICIOUS network lifetime risk management security TRUST untrustworthy
下载PDF
Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network
14
作者 Lei Feng Bo Wang +2 位作者 Fuqi Ma Hengrui Ma Mohamed AMohamed 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1487-1501,共15页
As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk dete... As the scale of the power system continues to expand,the environment for power operations becomes more and more complex.Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately.Therefore,more reliable and accurate security control methods are urgently needed.In order to improve the accuracy and reliability of the operation risk management and control method,this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network.To provide early warning and control of targeted risks,first,the video stream is framed adaptively according to the pixel changes in the video stream.Then,the optimized MobileNet is used to extract the feature map of the video stream,which contains both time-series and static spatial scene information.The feature maps are combined and non-linearly mapped to realize the identification of dynamic operating scenes.Finally,training samples and test samples are produced by using the whole process image of a power company in Xinjiang as a case study,and the proposed algorithm is compared with the unimproved MobileNet.The experimental results demonstrated that the method proposed in this paper can accurately identify the type and start and end time of each operation link in the whole process of electric power operation,and has good real-time performance.The average accuracy of the algorithm can reach 87.8%,and the frame rate is 61 frames/s,which is of great significance for improving the reliability and accuracy of security control methods. 展开更多
关键词 security risk management key links identifications electric power operation spatiotemporal mixing convolution neural network MobileNet network
下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
15
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
下载PDF
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:2
16
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things Wireless sensor network Secure routing protocol Trust management
下载PDF
An Efficient Key Management Protocol for Wireless Sensor Networks 被引量:1
17
作者 ZENG Qingguang CUI Yanling LUO Juan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1927-1930,共4页
Key management is a fundamental security service in wireless sensor networks. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper... Key management is a fundamental security service in wireless sensor networks. The communication security problems for these networks are exacerbated by the limited power and energy of the sensor devices. In this paper, we describe the design and implementation of an efficient key management scheme based on low energy adaptive clustering hierarchy(LEACH) for wireless sensor networks. The design of the protocol is motivated by the observation that many sensor nodes in the network play different roles. The paper presents different keys are set to the sensors for meeting different transmitting messages and variable security requirements. Simulation results show that our key management protocol based-on LEACH can achieve better performance. The energy consumption overhead introduced is remarkably low compared with the original Kerberos schemes. 展开更多
关键词 sensor networks key management security low energy adaptive clustering hierarchy (LEACH)
下载PDF
Study on key management scheme for heterogeneous wireless sensor networks
18
作者 Qin Danyang Ma Jingya +3 位作者 Zhang Yan Yang Songxiang Ji Ping Feng Pan 《High Technology Letters》 EI CAS 2018年第4期343-350,共8页
Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it b... Heterogeneous wireless sensor network( HWSN) is composed of different functional nodes and is widely applied. With the deployment in hostile environment,the secure problem of HWSN is of great importance; moreover,it becomes complex due to the mutual characteristics of sensor nodes in HWSN. In order to enhance the network security,an asymmetric key pre-distributed management scheme for HWSN is proposed combining with authentication process to further ensure the network security; meanwhile,an effective authentication method for newly added nodes is presented. Simulation result indicates that the proposed scheme can improve the network security while reducing the storage space requirement efficiently. 展开更多
关键词 HETEROGENEOUS WIRELESS sensor network(HWSN) KEY management AUTHENTICATION network security STORAGE space
下载PDF
Secure Digital Contents Distributing System on P2P Networks
19
作者 Yi-Ju Lin Ing-Chau Chang +1 位作者 Hung-Wen Yang Chou-Chen Yang 《Journal of Electronic Science and Technology》 CAS 2012年第3期263-268,共6页
In recent years, the file-sharing applications of peer-to-peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high sealability and efficiency se... In recent years, the file-sharing applications of peer-to-peer (P2P) systems, such as Napster, Bit-Torrent (BT), Gnutella, have become very popular, with BT offering particularly high sealability and efficiency service to transmit files. But BT does not enforce the access control process, so a lot of unauthorized files are freely shared. In this paper, we proposed a digital rights management (DRM) system for BT environment to solve the serious piracy issue by using lightweight encryption methods in order to he adopted by small mobile devices in wireless environment. 展开更多
关键词 Bit-Torrent content sharing digitalrights management peer-to-peer networks security.
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
20
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
上一页 1 2 179 下一页 到第
使用帮助 返回顶部