Добірка наукової літератури з теми "System and network security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "System and network security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "System and network security"
Zhou, Wanlei, and Yang Xiang. "Network and system security." Journal of Network and Computer Applications 32, no. 2 (March 2009): 345–46. http://dx.doi.org/10.1016/j.jnca.2008.06.001.
Повний текст джерелаHe, Shen, Jing Huang, and Penglin Yang. "Build with intrinsic security: Trusted autonomy security system." International Journal of Distributed Sensor Networks 16, no. 11 (November 2020): 155014772097453. http://dx.doi.org/10.1177/1550147720974535.
Повний текст джерелаGanzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.
Повний текст джерелаMegat Mohamed Noor, Megat Norulazmi. "Community based home security system using wireless mesh network." International Journal of Academic Research 5, no. 5 (October 10, 2013): 73–79. http://dx.doi.org/10.7813/2075-4124.2013/5-5/a.9.
Повний текст джерелаKozlov, Dmitriy, and Natalia Sadovnikova. "Security System of POS-Network." NBI Technologies 14, no. 1 (September 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.1.1.
Повний текст джерелаAdamczyk, Piotr, Grzegorz Kiryk, Jarosław Napiórkowski, and Andrzej Walczak. "Network model of security system." MATEC Web of Conferences 76 (2016): 02002. http://dx.doi.org/10.1051/matecconf/20167602002.
Повний текст джерелаWhite, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.
Повний текст джерелаRöpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.
Повний текст джерелаMcDonald, Kenneth, Joshua Akers, Forrest Bartz, Daniel Beck, Israel Castro, and LTC Robert Prins. "Food Security Network Modeling." Industrial and Systems Engineering Review 4, no. 2 (November 12, 2016): 114–30. http://dx.doi.org/10.37266/iser.2016v4i2.pp114-130.
Повний текст джерелаB N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.
Повний текст джерелаДисертації з теми "System and network security"
Yucel, Okan. "Information System Security." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/4/1260303/index.pdf.
Повний текст джерелаMantere, M. (Matti). "Network security monitoring and anomaly detection in industrial control system networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526208152.
Повний текст джерелаTiivistelmä Kehittyneet yhteiskunnat käyttävät teollisuuslaitoksissaan ja infrastruktuuriensa operoinnissa monimuotoisia automaatiojärjestelmiä. Näiden automaatiojärjestelmien tieto- ja kyberturvallisuuden tila on hyvin vaihtelevaa. Laitokset ja niiden hyödyntämät järjestelmät voivat edustaa usean eri aikakauden tekniikkaa ja sisältää useiden eri aikakauden heikkouksia ja haavoittuvaisuuksia. Järjestelmät olivat aiemmin suhteellisen eristyksissä muista tietoverkoista kuin omista kommunikaatioväylistään. Tämä automaatiojärjestelmien eristyneisyyden heikkeneminen on luonut uuden joukon uhkia paljastamalla niiden kommunikaatiorajapintoja ympäröivälle maailmalle. Nämä verkkoympäristöt ovat kuitenkin edelleen verrattaen eristyneitä ja tätä ominaisuutta voidaan hyödyntää niiden valvonnassa. Tässä työssä esitetään tutkimustuloksia näiden verkkojen turvallisuuden valvomisesta erityisesti poikkeamien havainnoinnilla käyttäen hyväksi koneoppimismenetelmiä. Alkuvaiheen haasteiden ja erityispiirteiden tutkimuksen jälkeen työssä käytetään itsejärjestyvien karttojen (Self-Organizing Map, SOM) algoritmia esimerkkiratkaisun toteutuksessa uuden konseptin havainnollistamiseksi. Tämä uusi konsepti on tapahtumapohjainen koneoppiva poikkeamien havainnointi (Event-Driven Machine Learning Anomaly Detection, EMLAD). Työn kontribuutiot ovat seuraavat, kaikki teollisuusautomaatioverkkojen kontekstissa: ehdotus yhdeksi anomalioiden havainnoinnissa käytettävien ominaisuuksien ryhmäksi, koneoppivan poikkeamien havainnoinnin käyttökelpoisuuden toteaminen, laajennettava ja joustava esimerkkitoteutus uudesta EMLAD-konseptista toteutettuna Bro NSM työkalun ohjelmointikielellä
Coffey, Thomas. "A distributed global-wide security system." Thesis, University of Ulster, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260989.
Повний текст джерелаScully, Michael N. B. "Network and system security in an information age." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/204.
Повний текст джерелаBachelors
Business Administration
Management Information Systems
Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.
Повний текст джерелаLessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.
Повний текст джерелаBurchett, Ian. "Quantifying Computer Network Security." TopSCHOLAR®, 2011. http://digitalcommons.wku.edu/theses/1118.
Повний текст джерелаSong, Zixuan. "A Network based Home surveillance/ monitoring system : Router based Deployment and Network Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47314.
Повний текст джерелаWang, Haiyuan. "Security Architecture for the TEAMDEC System." Thesis, Virginia Tech, 1999. http://hdl.handle.net/10919/9778.
Повний текст джерелаMaster of Science
Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.
Повний текст джерелаКниги з теми "System and network security"
Vacca, John R. Network and system security. Burlington, MA: Syngress/Elsevier, 2010.
Знайти повний текст джерелаNetwork and system security. Burlington, MA: Syngress, 2010.
Знайти повний текст джерелаYang, Min, Chao Chen, and Yang Liu, eds. Network and System Security. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92708-0.
Повний текст джерелаLiu, Joseph K., and Xinyi Huang, eds. Network and System Security. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5.
Повний текст джерелаQiu, Meikang, Shouhuai Xu, Moti Yung, and Haibo Zhang, eds. Network and System Security. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0.
Повний текст джерелаYan, Zheng, Refik Molva, Wojciech Mazurczyk, and Raimo Kantola, eds. Network and System Security. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2.
Повний текст джерелаChen, Jiageng, Vincenzo Piuri, Chunhua Su, and Moti Yung, eds. Network and System Security. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1.
Повний текст джерелаKutyłowski, Mirosław, Jun Zhang, and Chao Chen, eds. Network and System Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65745-1.
Повний текст джерелаXu, Li, Elisa Bertino, and Yi Mu, eds. Network and System Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9.
Повний текст джерелаAu, Man Ho, Barbara Carminati, and C. C. Jay Kuo, eds. Network and System Security. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11698-3.
Повний текст джерелаЧастини книг з теми "System and network security"
Xu, Jianfeng, Fuhui Sun, and Qiwei Chen. "Network Security." In Introduction to the Smart Court System-of-Systems Engineering Project of China, 343–84. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2382-1_7.
Повний текст джерелаRosenberg, Ishai, and Ehud Gudes. "Evading System-Calls Based Intrusion Detection Systems." In Network and System Security, 200–216. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_14.
Повний текст джерелаKluczniak, Kamil, Lucjan Hanzlik, Przemysław Kubiak, and Mirosław Kutyłowski. "Anonymous Evaluation System." In Network and System Security, 283–99. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_19.
Повний текст джерелаZhang, Jian-feng, Fei Liu, Li-ming Zheng, Yan Jia, and Peng Zou. "Using Network Security Index System to Evaluate Network Security." In The 19th International Conference on Industrial Engineering and Engineering Management, 989–1000. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38433-2_104.
Повний текст джерелаLiu, Mengling, and Man Ho Au. "Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks." In Network and System Security, 547–60. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_31.
Повний текст джерелаLi, Yunhao, Weichuan Mo, Cong Li, Haiyang Wang, Jianwei He, Shanshan Hao, and Hongyang Yan. "Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning." In Network and System Security, 51–65. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_3.
Повний текст джерелаZhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie, and Gaofei Wu. "An Android Vulnerability Detection System." In Network and System Security, 169–83. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.
Повний текст джерелаLiang, Lulu, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, and Xin Huang. "A Denial of Service Attack Method for IoT System in Photovoltaic Energy System." In Network and System Security, 613–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_48.
Повний текст джерелаZhang, Li, Zhuo Lv, Xuesong Zhang, Cen Chen, Nuannuan Li, Yidong Li, and Wei Wang. "A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System." In Network and System Security, 408–17. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_24.
Повний текст джерелаChow, Sherman S. M., Russell W. F. Lai, Xiuhua Wang, and Yongjun Zhao. "Privacy Preserving Credit Systems." In Network and System Security, 184–99. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_13.
Повний текст джерелаТези доповідей конференцій з теми "System and network security"
Zhang, Jifang. "Design of Campus Network Security System Based on Network Information Security." In 2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC). IEEE, 2022. http://dx.doi.org/10.1109/ipec54454.2022.9777499.
Повний текст джерелаRoth, Sebastian, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, and Ben Stock. "Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.23046.
Повний текст джерелаStevens, Rock, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, and Michelle L. Mazurek. "Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24003.
Повний текст джерелаWei, Sixiao, Dan Shen, Linqiang Ge, Wei Yu, Erik P. Blasch, Khanh D. Pham, and Genshe Chen. "Secured network sensor-based defense system." In SPIE Defense + Security, edited by Khanh D. Pham and Genshe Chen. SPIE, 2015. http://dx.doi.org/10.1117/12.2179282.
Повний текст джерелаJi, Song, Ling Pang, and Wenying Xia. "Campus Network Security Analysis and Design of Security System." In 2015 International Conference on Computational Intelligence and Communication Networks (CICN). IEEE, 2015. http://dx.doi.org/10.1109/cicn.2015.209.
Повний текст джерелаHe, Qian. "Smart City Network Security Evaluation System." In 2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS). IEEE, 2021. http://dx.doi.org/10.1109/icitbs53129.2021.00070.
Повний текст джерелаXiaobo Huang, Mingxue Zhang, and Xiaoyan Wang. "Protection system for network boundary security." In 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccsit.2010.5564727.
Повний текст джерелаLee, Shinkyung, Namje Park, and Dooho Choi. "Security Management System for Sensor Network." In 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.254.
Повний текст джерелаPedireddy, Taraka, and José M. Vidal. "A prototype multiAgent network security system." In the second international joint conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/860575.860812.
Повний текст джерелаXiaodong, Ding, Wang Quan, Yang Pengfei, Zhou Haijing, Huang Yuyan, Weng Haitao, and Pan Zhongbin. "Security System for Internal Network Printing." In 2012 Eighth International Conference on Computational Intelligence and Security (CIS). IEEE, 2012. http://dx.doi.org/10.1109/cis.2012.139.
Повний текст джерелаЗвіти організацій з теми "System and network security"
Scarfone, Karen, and Victoria Thompson. System and network security acronyms and abbreviations. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7581.
Повний текст джерелаMittrick, Mark R. Network Basic Language Translation System: Security Infrastructure. Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada469904.
Повний текст джерелаDinkel, Charles. Secure data network system (SDNS) network, transport, and message security protocols. Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.90-4250.
Повний текст джерелаCapell, Peter. Analysis of Courses in Information Management and Network System Security & Survivability. Fort Belvoir, VA: Defense Technical Information Center, May 1999. http://dx.doi.org/10.21236/ada363791.
Повний текст джерелаHurd, Steven A., Jason Edwin Stamp, David P. Duggan, and Adrian R. Chavez. Applying New Network Security Technologies to SCADA Systems. Office of Scientific and Technical Information (OSTI), November 2006. http://dx.doi.org/10.2172/1137212.
Повний текст джерелаMiller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.
Повний текст джерелаSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, November 1997. http://dx.doi.org/10.21236/ada405150.
Повний текст джерелаSECRETARY OF THE AIR FORCE WASHINGTON DC. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Plan. Volume 3. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada405155.
Повний текст джерелаKwiat, Paul, Eric Chitambar, Andrew Conrad, and Samantha Isaac. Autonomous Vehicle-Based Quantum Communication Network. Illinois Center for Transportation, September 2022. http://dx.doi.org/10.36501/0197-9191/22-020.
Повний текст джерелаByer, David E. Utilizing Routine Water Quality Instruments and Artificial Neural Networks for Monitoring Distribution System Security. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada414222.
Повний текст джерела