Corporate networks: Information security

被引:0
作者
Kapustyan, Maria
机构
来源
TCSET 2006: MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE, PROCEEDINGS | 2006年
关键词
corporate networks; information security; packet switching; loading of routers; data flow; traffic loadings operation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper the problem of information security in corporate networks and systems is considered.
引用
收藏
页码:483 / 483
页数:1
相关论文
共 50 条
  • [11] A Structured Comparison of the Corporate Information Security Maturity Level
    Schmid, Michael
    Pape, Sebastian
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2019, 2019, 562 : 223 - 237
  • [12] Security issues in mobile information networks
    Hardjono, T
    Seberry, J
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1021 - 1026
  • [13] Corporate information security education: Is outcomes based education the solution?
    Van Niekerk, J
    Von Solms, R
    [J]. INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 3 - 18
  • [14] The Impact of Social Engineering on Information Security: an approach oriented to Corporate Management
    Aramuni, Joao Paulo
    Maia, Luiz Claudio
    [J]. ATOZ-NOVAS PRATICAS EM INFORMACAO E CONHECIMENTO, 2018, 7 (01): : 31 - 37
  • [15] Tasks of Providing Information Security in Distributed Computing Networks
    Konoplev, A. S.
    Kalinin, M. O.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 669 - 672
  • [16] The Monitoring of Information Security of Remote Devices of Wireless Networks
    Lebedev, Ilya
    Korzhuk, Viktoria
    [J]. INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, 2015, 9247 : 3 - 10
  • [17] Generating a Standardized Upper Ontology for Security of Information and Networks
    Elci, Atilla
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 27 - 32
  • [18] Approach to Information Security Control of Complex Computer Networks
    Fatkieva, Roza R.
    Vorobiev, Vladimir I.
    Levonevskiy, Dmitriy K.
    [J]. PROCEEDINGS OF THE XIX IEEE INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM 2016), 2016, : 71 - 72
  • [19] Information Security: Artificial Immune Detectors in Neural Networks
    Fatima, Huda
    Al-Turki, Saleh Mohammed
    Pradhan, Sateesh Kumar
    Dash, G. N.
    [J]. 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [20] Information security through controlled quantum teleportation networks
    Hamdoun, Hala
    Sagheer, Alaa
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2020, 6 (04) : 463 - 470