Zobrazeno 1 - 10
of 70
pro vyhledávání: '"software-defined security"'
Autor:
Yuancheng LI, Yongtai QIN
Publikováno v:
Tongxin xuebao, Vol 44, Pp 181-192 (2023)
To overcome the problem that the real-time optimization of the quality of service (QoS) in software-defined security scenarios was hindered by the mismatch between security protection measures and business scenarios, which led to difficulties in appl
Externí odkaz:
https://doaj.org/article/6b978aa21c01467aa7b409096144d26a
Publikováno v:
Renmin Zhujiang, Vol 44 (2023)
In view of the increasingly concealed,complicated,and intelligent network attacks,this paper analyzes the security protection status and network security problems faced by the water conservancy network.A cooperative defense system of water conservanc
Externí odkaz:
https://doaj.org/article/b3ff24a9fb0a480c9f3447f4b73982dc
Publikováno v:
Dianxin kexue, Vol 37, Pp 60-71 (2021)
Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G priv
Externí odkaz:
https://doaj.org/article/26c3802d21d54b20b97a75f047dc07dd
Publikováno v:
Dianxin kexue, Vol 36, Pp 133-138 (2020)
Based on continuous monitoring and retrospective analysis,adaptive security architecture was constructed to be security defense system integrating prevention,detection,response and prediction,which possesses intelligent and elastic defense ability co
Externí odkaz:
https://doaj.org/article/b25d52e7800841869f15d67a05fda745
Autor:
Mahdi Dibaei, Xi Zheng, Kun Jiang, Robert Abbas, Shigang Liu, Yuexin Zhang, Yang Xiang, Shui Yu
Publikováno v:
Digital Communications and Networks, Vol 6, Iss 4, Pp 399-421 (2020)
Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g., hijacking attacks) and vehicle-to-everything com
Externí odkaz:
https://doaj.org/article/d78b10dcd96f438abe982c026a90e2c1
Publikováno v:
Dianxin kexue, Vol 36, Pp 10-15 (2020)
Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of
Externí odkaz:
https://doaj.org/article/0b101298658746899930159ed7010bef
Autor:
Yuancheng Li, Yongtai Qin
Publikováno v:
Information, Vol 14, Iss 4, p 209 (2023)
In today’s business environment, reducing costs is crucial due to the variety of Internet of Things (IoT) devices and security infrastructure. However, applying security measures to complex business scenarios can lead to performance degradation, ma
Externí odkaz:
https://doaj.org/article/27d25c4016e042f0bc0b1c50c004fdcb
Publikováno v:
IEEE Access, Vol 7, Pp 87002-87016 (2019)
Industrial control systems (ICSs) are facing increasingly severe security threats. Zone isolation, a commonly adopted idea for stopping attack propagation in general information systems, has been investigated for ICS security protection. It is usuall
Externí odkaz:
https://doaj.org/article/3e2bd849198740c3a8bd03304d71f997
Publikováno v:
Dianxin kexue, Vol 33, Pp 186-192 (2017)
Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest pro
Externí odkaz:
https://doaj.org/article/a0dda3ad65ba4ab6bc63204066f99a0e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.