NETWORK_SECURITY

作品数:249被引量:639H指数:8
导出分析报告
相关作者:薛静锋曹元大龚俭刘建航陈英杰更多>>
相关机构:清华大学东南大学南京航空航天大学北京理工大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家高技术研究发展计划国家重点基础研究发展计划国家教育部博士点基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 基金=国家重点基础研究发展计划(973Program)x
条 记 录,以下是1-5
视图:
排序:
A survey of network anomaly visualization被引量:3
《Science China(Information Sciences)》2017年第12期122-138,共17页Tianye ZHANG Xumeng WANG Zongzhuang LI Fangzhou GUO Yuxin MA Wei CHEN 
supported by National Basic Research Program of China(973 Program)(Grant No.2015CB352503);Major Program of National Natural Science Foundation of China(Grant No.61232012);National Natural Science Foundation of China(Grant Nos.61422211,u1536118,u1536119);Zhejiang Provincial Natural Science Foundation of China(Grant No.LR13F020001);Fundamental Research Funds for the Central Universities
Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed ...
关键词:network anomaly network anomaly visualization visual analysis network security visualization 
A Dynamic Probabilistic Marking Approach with Multi-Tag for Tracing ICMP-Based DoS Attacks
《Wuhan University Journal of Natural Sciences》2013年第6期484-488,共5页CHEN Xiuzhen MA Jin LI Shenghong CHEN Ken SERHROUCHNI Ahmed 
Supported by the National Natural Science Foundation of China(61271316);National Key Basic Research Program of China(973 Program)(2010CB731403);Opening Project of State Key Laboratory for Manufacturing Systems Engineering of Xi’an Jiaotong University(sklms2012005)
This paper presents a dynamic probabilistic marking algorithm with multiple routing address tags, which allows the vic- tim to traceback the origin of ICMP (Internet Control Message Pro- tocol)-based direct and refl...
关键词:network security denial of service IP traceback dynamic probabilistic marking multi-tag 
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
《Journal of Electronics(China)》2013年第6期574-586,共13页Yang Lijun Wu Meng Ding Chao 
Supported by the National Basic Research Program of China(973 Program)(No.2011CB302903);the National Natural Science Foundation of China(No.61100213);the Key Program of Natural Science for Universities of Jiangsu Province(No.10KJA510035);the Specialized Research Fund for the Doctoral Program of Higher Education(20113223120007);the Science and Technology Program of Nanjing(201103003);the Postgraduate Innovation Project Foundation of Jiangsu Province(No.CXLX11_0411)
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso...
关键词:Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography 
Design and Implementation of Trusted-Router Based on Trust Management System
《China Communications》2011年第5期63-69,共7页孙斌 毛元奎 
supported by National Key Basic Research Program of China(973 Program)under Grant No.2007CB310704;National Natural Science Foundation of China under Grant No.90718001,60973146
This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its...
关键词:network security trust management trust algorithm trusted router QOS 
Building a next generation Internet with source address validation architecture被引量:8
《Science in China(Series F)》2008年第11期1681-1691,共11页WU JianPing1,3,REN Gang1,3 & LI Xing2,3 1 Department of Computer Science,Tsinghua University,Beijing 100084,China 2 Department of Electronic Engineering,Tsinghua University,Beijing 100084,China 3 Tsinghua National Laboratory for Information Science and Technology(TNList) ,Beijing 100084,China 
the National Natural Science Foundation of China (Grant No. 90704001);the National Basic Research Program of China (973 Program) (Grant No. 2003CB314800)
The IP packet forwarding of current Internet is mainly destination based. In the forwarding process, the source IP address is not checked in most cases.This causes serious security, management and accounting problems....
关键词:IP source address validation network architecture network security 
检索报告 对象比较 聚类工具 使用帮助 返回顶部