共 50 条
- [32] Formal validation of automated policy refinement in the management of network security systems International Journal of Information Security, 2010, 9 : 99 - 125
- [33] Research on the Essential Network Equipment Risk Assessment Methodology based on Vulnerability Scanning Technology PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 1023 - 1027
- [34] Performance Evaluation of Network Scanning Tools with Operation of Firewall 2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 876 - 881
- [35] A Hierarchical Network Security Risk Assessment Method Based on Vulnerability Attack Link Generated 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 113 - 118
- [36] ENHANCING INDUSTRIAL CONTROL NETWORK SECURITY THROUGH VULNERABILITY DETECTION AND ATTACK GRAPH ANALYSIS SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 65 - 74
- [37] High Performance Pattern Matching Algorithm for Network Security INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 83 - 87
- [38] Network Security Metrics and Performance for Healthcare Systems Management 2015 17TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATION & SERVICES (HEALTHCOM), 2015, : 189 - 194
- [39] Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (04): : 765 - 784
- [40] Modern Network Security Practices: Using Rainbow Tables to Solve Organizational Issues 2018 IEEE 39TH SARNOFF SYMPOSIUM, 2018,