NETWORK_SECURITY

作品数:249被引量:639H指数:8
导出分析报告
相关作者:薛静锋曹元大龚俭刘建航陈英杰更多>>
相关机构:清华大学东南大学南京航空航天大学北京理工大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 基金=国家重点基础研究发展计划x
条 记 录,以下是1-10
视图:
排序:
Game theoretic analysis for the mechanism of moving target defense被引量:5
《Frontiers of Information Technology & Electronic Engineering》2017年第12期2017-2034,共18页Gui-lin CAI Bao-sheng WANG Qian-qian XING 
Project supported by the National Basic Research Program(973)of China(No.2012CB315906)
Moving target defense (MT_D) is a novel way to alter the asymmetric situation of attacks and defenses, and a lot of MTD studies have been carried out recently. However, relevant analysis for the defense mechanism of...
关键词:Network security Moving target defense (MTD) Defense mechanism Defense model Game theory 
A survey of network anomaly visualization被引量:3
《Science China(Information Sciences)》2017年第12期122-138,共17页Tianye ZHANG Xumeng WANG Zongzhuang LI Fangzhou GUO Yuxin MA Wei CHEN 
supported by National Basic Research Program of China(973 Program)(Grant No.2015CB352503);Major Program of National Natural Science Foundation of China(Grant No.61232012);National Natural Science Foundation of China(Grant Nos.61422211,u1536118,u1536119);Zhejiang Provincial Natural Science Foundation of China(Grant No.LR13F020001);Fundamental Research Funds for the Central Universities
Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed ...
关键词:network anomaly network anomaly visualization visual analysis network security visualization 
Route Guardian: Constructing Secure Routing Paths in Software-Defined Networking被引量:2
《Tsinghua Science and Technology》2017年第4期400-412,共13页Mengmeng Wang Jianwei Liu Jian Mao Haosu Cheng Jie Chen Chan Qi 
supported in part by the National Natural Science Foundation of China (Nos. 61402029, 61370190, and 61379002);the National Key Basic Research Program (973) of China (No. 2012CB315905)
Software-Defined Networking(SDN) decouples the control plane and the data plane in network switches and routers, which enables the rapid innovation and optimization of routing and switching configurations. However,t...
关键词:Software-Defined Networking(SDN) network security virtualization capacity-based routing security oriented routing dynamic routing reconfiguration 
A keyed-hashing based self-synchronization mechanism for port address hopping communication被引量:2
《Frontiers of Information Technology & Electronic Engineering》2017年第5期719-728,共10页Yue-bin LUO Bao-sheng WANG Xiao-feng WANG Bo-feng ZHANG 
Project supported by the National Basic Research Program(973)of China(No.2012CB315906);the National Natural Science Foundation of China(No.61303264)
Port address hopping(PAH) communication is a powerful network moving target defense(MTD)mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is ...
关键词:Synchronization Port address hopping Moving target defense Network security 
Strategies for network security
《Science China(Information Sciences)》2015年第1期117-130,共14页LI AngSheng LI XueChen PAN YiCheng ZHANG Wei 
supported by the Hundred-Talent Program of the Chinese Academy of Sciences;supported by the Grand Project "Network Algorithms and Digital Information" of the Institute of Software;the Chinese Academy of Sciences;the National Natural Science Foundation of China (Grant No. 61161130530);the National Basic Research Program of China (973) (Grant No. 2014CB340302)
Security of networks has become an increasingly important issue in the highly connected world.Security depends on attacks. Typical attacks include both cascading failure of virus spreading and of information propagati...
关键词:complex networks security of networks strategy for network security cascading failure model of networks 
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
《Journal of Electronics(China)》2013年第6期574-586,共13页Yang Lijun Wu Meng Ding Chao 
Supported by the National Basic Research Program of China(973 Program)(No.2011CB302903);the National Natural Science Foundation of China(No.61100213);the Key Program of Natural Science for Universities of Jiangsu Province(No.10KJA510035);the Specialized Research Fund for the Doctoral Program of Higher Education(20113223120007);the Science and Technology Program of Nanjing(201103003);the Postgraduate Innovation Project Foundation of Jiangsu Province(No.CXLX11_0411)
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso...
关键词:Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography 
A Dynamic Probabilistic Marking Approach with Multi-Tag for Tracing ICMP-Based DoS Attacks
《Wuhan University Journal of Natural Sciences》2013年第6期484-488,共5页CHEN Xiuzhen MA Jin LI Shenghong CHEN Ken SERHROUCHNI Ahmed 
Supported by the National Natural Science Foundation of China(61271316);National Key Basic Research Program of China(973 Program)(2010CB731403);Opening Project of State Key Laboratory for Manufacturing Systems Engineering of Xi’an Jiaotong University(sklms2012005)
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl...
关键词:network security denial of service IP traceback dynamic probabilistic marking multi-tag 
Design and Implementation of Trusted-Router Based on Trust Management System
《China Communications》2011年第5期63-69,共7页孙斌 毛元奎 
supported by National Key Basic Research Program of China(973 Program)under Grant No.2007CB310704;National Natural Science Foundation of China under Grant No.90718001,60973146
This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its...
关键词:network security trust management trust algorithm trusted router QOS 
An index-split Bloom filter for deep packet inspection被引量:2
《Science China(Information Sciences)》2011年第1期23-37,共15页HUANG Kun ZHANG DaFang 
supported by the National Natural Science Foundation of China(Grant Nos.90718008,60673155);the National Basic Research Program of China(Grant No.2007CB310702)
Deep packet inspection (DPI) scans both packet headers and payloads to search for predefined sig- natures. As link rates and traffic volumes of Internet are constantly growing, DPI is facing the high performance cha...
关键词:network security packet processing deep packet inspection hash table Bloom filter 
Building a next generation Internet with source address validation architecture被引量:8
《Science in China(Series F)》2008年第11期1681-1691,共11页WU JianPing1,3,REN Gang1,3 & LI Xing2,3 1 Department of Computer Science,Tsinghua University,Beijing 100084,China 2 Department of Electronic Engineering,Tsinghua University,Beijing 100084,China 3 Tsinghua National Laboratory for Information Science and Technology(TNList) ,Beijing 100084,China 
the National Natural Science Foundation of China (Grant No. 90704001);the National Basic Research Program of China (973 Program) (Grant No. 2003CB314800)
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems....
关键词:IP source address validation network architecture network security 
检索报告 对象比较 聚类工具 使用帮助 返回顶部