[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kumar et al., 2014 - Google Patents

Network security–an updated perspective

Kumar et al., 2014

View PDF
Document ID
9776871775455913034
Author
Kumar G
Kumar K
Publication year
Publication venue
Systems Science & Control Engineering: An Open Access Journal

External Links

Snippet

Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources as well as ensuring their availability through proper …
Continue reading at www.tandfonline.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Perwej et al. A systematic literature review on the cyber security
Kumar et al. Network security–an updated perspective
US9942250B2 (en) Network appliance for dynamic protection from risky network activities
Vacca Network and system security
Pandey et al. A survey of cyber security trends, emerging technologies and threats
Barroso Botnets-the silent threat
McMahon et al. New global cybercrime calls for high-tech cyber-cops
Priyadarshini Introduction on cybersecurity
Chivukula et al. A study of cyber security issues and challenges
Alazab et al. An analysis of the nature of spam as cybercrime
Alghenaim et al. Phishing attack types and mitigation: A survey
Kaur et al. Cybersecurity threats in FinTech
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
Cekerevac et al. HACKING, PROTECTION AND THE CONSEQUENCES OF HACKING.
Hossain et al. Classifying cyberattacks on financial organizations based on publicly available deep web dataset
Karie et al. Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats
West Preventing system intrusions
Norris Mitigating the effects of doxing
Hilbert Living with cybercrime
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Sarowa et al. Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries
Quinlan et al. A brief history of law enforcement hacking in the United States
Bederna et al. Effects of botnets–a human-organisational approach
Gohel Cyber security and social media
Cluley Sizing up the malware threat–key malware trends for 2010