NETWORK_SECURITY

作品数:249被引量:639H指数:8
导出分析报告
相关作者:薛静锋曹元大龚俭刘建航陈英杰更多>>
相关机构:清华大学东南大学南京航空航天大学北京理工大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 基金=国家高技术研究发展计划(863Program)x
条 记 录,以下是1-4
视图:
排序:
Detecting Hidden Malware Method Based on "In-VM" Model被引量:2
《China Communications》2011年第4期99-108,共10页陈林 刘波 胡华平 肖枫涛 张静 
National High Technical Research and Development Program of China(863 Program)under Grant No. 2008AA01Z414
Security tools are rapidly developed as network security threat is becoming more and more serious.To overcome the fundamental limitation of traditional host-based anti-malware system which is likely to be deceived and...
关键词:network security Virtual Machine Monitor(VMM) malware detection hidden process hardware virtualization 
Application-Transparent Live Migration for Virtual Machine on Network Security Enhanced Hypervisor被引量:2
《China Communications》2011年第3期32-42,共11页陈贤钦 高小鹏 万寒 王素梅 龙翔 
supported by State Key Laboratory of Software Development Environment under Grant No. SKLSDE-2009ZX-02;China Aviation Science Fund under Grant No.20081951;National High Technical Research and Development Program of China (863 Program) under Grant No.2007AA01Z183
As the number of Virtual Machines(VMs) consolidated on single physical server increases with the rapid advance of server hardware,virtual network turns complex and frangible.Modern Network Security Engines(NSE) are in...
关键词:live migration network security security context VIRTUALIZATION 
Network Security Incidents Frequency Prediction Based on Improved Genetic Algorithm and LSSVM被引量:2
《China Communications》2010年第4期126-131,共6页ZHAO Guangyao ZOU Peng HAN Weihong 
supported in part by the National High Technology Research and Development Program of China ("863" Program) (No.2007AA010502)
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici...
关键词:Genetic Algorithm LSSVM Network Security Incidents Time Series PREDICTION 
STRONGER PROVABLE SECURE MODEL FOR KEY EXCHANGE
《Transactions of Nanjing University of Aeronautics and Astronautics》2009年第4期313-319,共7页任勇军 王建东 徐大专 庄毅 
Supported by the National High Technology Research and Development Program of China("863"Program)(2006AA706103)~~
The key exchange is a fundamental building block in the cryptography. Several provable security models for the key exchange protocol are proposed. To determine the exact properties required by the protocols, a single ...
关键词:network security CRYPTOGRAPHY information security key exchange protocol 
检索报告 对象比较 聚类工具 使用帮助 返回顶部