Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Yi, Xiushuang"'
Autor:
Li, Fuliang, Guo, Zhenbei, Liang, Bocheng, Yi, Xiushuang, Wang, Xingwei, Li, Weichao, Wang, Yi
Publikováno v:
In Computer Networks 19 June 2021 192
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:1389-1393
The IPv4 protocol suite is vulnerable to a variety of attacks. IPv6 security is in many ways the same as IPv4 security, the basic mechaisms for transporting packets across the network stay mostly unchanged, and the upper-layer protocols that transpor
Publikováno v:
Wuhan University Journal of Natural Sciences. 11:1398-1402
Enterprise information systems with a great use of Web 2.0 technologies will be more open, free, and more efficient. With the contrast between classic Web technologies and Web 2.0 technologies, we represent a sample of enterprise information system b
Publikováno v:
RVSP
Honey net technologies play an increasingly important role in network security. However, conventional honey net has some disadvantages like low hardware utilization, complexity configuration and difficultly management increasingly highlighted. Toward
Publikováno v:
2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking & Parallel/Distributed Computing (SNPD); 2016, p553-556, 4p
Publikováno v:
Frontiers in Internet Technologies; 2013, p9-20, 12p
Publikováno v:
Recent Advances in Computer Science & Information Engineering (9783642257889); 2012, p39-44, 6p
Autor:
Xue, Lifang, Yi, XiusHuang
Publikováno v:
2011 Seventh International Conference on Computational Intelligence & Security (CIS); 2011, p1220-1223, 4p
Publikováno v:
Proceedings of SPIE; Nov2005 Part 2, Issue 1, p60222Z-60222Z-7, 7p