Kumar et al., 2014 - Google Patents
Network security–an updated perspectiveKumar et al., 2014
View PDF- Document ID
- 9776871775455913034
- Author
- Kumar G
- Kumar K
- Publication year
- Publication venue
- Systems Science & Control Engineering: An Open Access Journal
External Links
Snippet
Network security is a specialized field consisting of the provisions and policies to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources as well as ensuring their availability through proper …
- 238000000034 method 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Perwej et al. | A systematic literature review on the cyber security | |
Kumar et al. | Network security–an updated perspective | |
US9942250B2 (en) | Network appliance for dynamic protection from risky network activities | |
Vacca | Network and system security | |
Pandey et al. | A survey of cyber security trends, emerging technologies and threats | |
Barroso | Botnets-the silent threat | |
McMahon et al. | New global cybercrime calls for high-tech cyber-cops | |
Priyadarshini | Introduction on cybersecurity | |
Chivukula et al. | A study of cyber security issues and challenges | |
Alazab et al. | An analysis of the nature of spam as cybercrime | |
Alghenaim et al. | Phishing attack types and mitigation: A survey | |
Kaur et al. | Cybersecurity threats in FinTech | |
Diwan | An investigation and analysis of cyber security information systems: latest trends and future suggestion | |
Cekerevac et al. | HACKING, PROTECTION AND THE CONSEQUENCES OF HACKING. | |
Hossain et al. | Classifying cyberattacks on financial organizations based on publicly available deep web dataset | |
Karie et al. | Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats | |
West | Preventing system intrusions | |
Norris | Mitigating the effects of doxing | |
Hilbert | Living with cybercrime | |
Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
Sarowa et al. | Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries | |
Quinlan et al. | A brief history of law enforcement hacking in the United States | |
Bederna et al. | Effects of botnets–a human-organisational approach | |
Gohel | Cyber security and social media | |
Cluley | Sizing up the malware threat–key malware trends for 2010 |