Academic literature on the topic 'Network-hardening'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network-hardening.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network-hardening"
Zhao, Chao, Huiqiang Wang, Junyu Lin, Hongwu Lv, and Yushu Zhang. "A Generation Method of Network Security Hardening Strategy Based on Attack Graphs." International Journal of Web Services Research 12, no. 1 (2015): 45–61. http://dx.doi.org/10.4018/ijwsr.2015010104.
Full textManzanares, Antonio Izquierdo. "Hardening Network Infrastructure: Not Suitable for Everyone." IEEE Distributed Systems Online 8, no. 10 (2007): 4. http://dx.doi.org/10.1109/mdso.2007.4384584.
Full textWang, Lingyu, Steven Noel, and Sushil Jajodia. "Minimum-cost network hardening using attack graphs." Computer Communications 29, no. 18 (2006): 3812–24. http://dx.doi.org/10.1016/j.comcom.2006.06.018.
Full textPan, Zhong Feng, Gui Cheng Wang, Chong Lue Hua, and Hong Jie Pei. "Research and Development of LM Neural Network Prediction System for Grind-Hardening." Key Engineering Materials 416 (September 2009): 248–52. http://dx.doi.org/10.4028/www.scientific.net/kem.416.248.
Full textBorbor, Daniel, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Surviving unpatchable vulnerabilities through heterogeneous network hardening options." Journal of Computer Security 26, no. 6 (2018): 761–89. http://dx.doi.org/10.3233/jcs-171106.
Full textMyung, David, Wongun Koh, Jungmin Ko, et al. "Biomimetic strain hardening in interpenetrating polymer network hydrogels." Polymer 48, no. 18 (2007): 5376–87. http://dx.doi.org/10.1016/j.polymer.2007.06.070.
Full textLambiase, F., A. M. Di Ilio, and A. Paoletti. "Prediction of Laser Hardening by Means of Neural Network." Procedia CIRP 12 (2013): 181–86. http://dx.doi.org/10.1016/j.procir.2013.09.032.
Full textBouzid, Mehdi, and Emanuela Del Gado. "Network Topology in Soft Gels: Hardening and Softening Materials." Langmuir 34, no. 3 (2017): 773–81. http://dx.doi.org/10.1021/acs.langmuir.7b02944.
Full textWu, Xiao Ling, and Fei Ren. "Research on the Prediction Model of Laser Surface Hardening Index on Cylinder Liner Based on RBF." Advanced Materials Research 148-149 (October 2010): 215–18. http://dx.doi.org/10.4028/www.scientific.net/amr.148-149.215.
Full textKemp, R., G. A. Cottrell, H. K. D. H. Bhadeshia, G. R. Odette, T. Yamamoto, and H. Kishimoto. "Neural-network analysis of irradiation hardening in low-activation steels." Journal of Nuclear Materials 348, no. 3 (2006): 311–28. http://dx.doi.org/10.1016/j.jnucmat.2005.09.022.
Full textDissertations / Theses on the topic "Network-hardening"
Pekkanen, Peter, and David Söderman. "Network Hardening of Multilayer Switch." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54674.
Full textElwing-Malmfelt, Linus, and Oscar Keresztes. "Semi-automated hardening of networks based on security classifications." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21793.
Full textSimons, William R. "The challenges of network security remediation at a regional university." [Johnson City, Tenn. : East Tennessee State University], 2005. http://etd-submit.etsu.edu/etd/theses/available/etd-0209105-075524/unrestricted/SimonsW022105f.pdf.
Full textYildiz, Ersan. "Lateral Pressures On Rigid Retaining Walls : A Neural Network Approach." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1264415/index.pdf.
Full textIslam, Tania. "A heuristic approach to network hardening using attack graphs." Thesis, 2009. http://spectrum.library.concordia.ca/976518/1/MR63037.pdf.
Full textBooks on the topic "Network-hardening"
Wang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9.
Full textAlbanese, Massimiliano (Computer scientist), author and Jajodia Sushil author, eds. Network hardening: An automated approach to improving network security. Springer, 2014.
Find full textHardening network infrastructure: [bulletproof your systems before you are hacked!]. McGraw-Hill/Osborne, 2004.
Find full textKenyon, Brian. Security Sage's Guide to Hardening the Network Infrastructure. Syngress, 2004.
Find full textSecurity Sage's Guide to Hardening the Network Infrastructure. Elsevier, 2004. http://dx.doi.org/10.1016/b978-1-931836-01-2.x5000-3.
Full textBook chapters on the topic "Network-hardening"
Wang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Introduction." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_1.
Full textWang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Related Work." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_2.
Full textWang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Attack Graph and Network Hardening." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_3.
Full textWang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Minimum-Cost Network Hardening." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_4.
Full textWang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Linear-Time Network Hardening." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_5.
Full textWang, Lingyu, Massimiliano Albanese, and Sushil Jajodia. "Conclusion." In Network Hardening. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04612-9_6.
Full textCamp, L. Jean. "Hardening the Network from the Friend Within." In Information Security and Privacy. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1_17.
Full textKwon, Young-Woo, Eli Tilevich, and Taweesup Apiwattanapong. "DR-OSGi: Hardening Distributed Components with Network Volatility Resiliency." In Middleware 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10445-9_19.
Full textBopche, Ghanshyam S., and Babu M. Mehtre. "Exploiting Domination in Attack Graph for Enterprise Network Hardening." In Communications in Computer and Information Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22915-7_32.
Full textCheng, Chih-Hong. "Safety-Aware Hardening of 3D Object Detection Neural Network Systems." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54549-9_14.
Full textConference papers on the topic "Network-hardening"
Jun-chun, Ma, and Sun Ji-yin. "Optimal Network Hardening Model Based on Parallel Genetic Algorithm." In 2012 International Conference on Industrial Control and Electronics Engineering (ICICEE). IEEE, 2012. http://dx.doi.org/10.1109/icicee.2012.150.
Full textGang, Liu, Ma Yingge, Wang Kejun, and Huang Shaobin. "A Domain Security Ontology Network Constructing and Hardening Technology." In 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC). IEEE, 2014. http://dx.doi.org/10.1109/imccc.2014.167.
Full textMan, Dapeng, Yang Wu, and Yongtian Yang. "A Method Based on Global Attack Graph for Network Hardening." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.1086.
Full textAlbanese, Massimiliano, Sushil Jajodia, and Steven Noel. "Time-efficient and cost-effective network hardening using attack graphs." In 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2012. http://dx.doi.org/10.1109/dsn.2012.6263942.
Full textYigit, Beytullah, Gurkan Gur, and Fatih Alagoz. "Cost-Aware Network Hardening with Limited Budget Using Compact Attack Graphs." In 2014 IEEE Military Communications Conference (MILCOM). IEEE, 2014. http://dx.doi.org/10.1109/milcom.2014.31.
Full textChen, Feng, Lingyu Wang, and Jinshu Su. "An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs." In 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.38.
Full textChao, Zhao, Wang Huiqiang, Guo Fangfang, Zhou Mo, and Zhang Yushu. "A Heuristic Method of Attack Graph Analysis for Network Security Hardening." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.18.
Full textIslam, Tania, and Lingyu Wang. "A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.9.
Full textZhang, Hangsheng, Haitao Liu, Jie Liang, et al. "Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game." In 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2020. http://dx.doi.org/10.1109/iscc50000.2020.9219722.
Full textMorovati, Vahid, Mohammad Ali Saadat, and Roozbeh Dargazany. "Modelling Stress Softening and Necking Phenomena in Double Network Hydrogels." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-12253.
Full text