Jun et al., 2004 - Google Patents
Application of mobile scanning agent in the network securityJun et al., 2004
View PDF- Document ID
- 15212640669546756021
- Author
- Jun M
- Shan F
- Chao T
- Gang M
- Publication year
- Publication venue
- Journal of Systems Engineering and Electronics
External Links
Snippet
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to …
- 230000002708 enhancing 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Helmer et al. | Lightweight agents for intrusion detection | |
US8566945B2 (en) | System and method for testing web applications with recursive discovery and analysis | |
US7865938B2 (en) | Enterprise-wide security system for computer devices | |
US7472421B2 (en) | Computer model of security risks | |
Helmer et al. | Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems | |
US20090328215A1 (en) | Semantic networks for intrusion detection | |
Sekar et al. | A specification-based approach for building survivable systems | |
EP2387746B1 (en) | Methods and systems for securing and protecting repositories and directories | |
US12113824B2 (en) | Distributed system for autonomous discovery and exploitation of an organization's computing | |
JP2007509389A (en) | Method and apparatus for extensible and secure remote desktop access | |
Jun et al. | Application of mobile scanning agent in the network security | |
Landauer et al. | Maintainable log datasets for evaluation of intrusion detection systems | |
US11003790B2 (en) | Preventing data leakage via version control systems | |
Ring et al. | A toolset for intrusion and insider threat detection | |
US20220247774A1 (en) | Methods and Systems for Accurately Assessing Application Access Risk | |
Bridges et al. | How do information security workers use host data? a summary of interviews with security analysts | |
Humphries et al. | Secure mobile agents for network vulnerability scanning | |
Snehi et al. | IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects | |
Mokhov et al. | Automating MAC spoofer evidence gathering and encoding for investigations | |
Rana et al. | A dual attack tree approach to assist command and control server analysis of the red teaming activity | |
Jolkkonen | Cloud Asset Identification Strategy | |
Hubballi et al. | Event Log Analysis and Correlation: A Digital Forensic Perspective | |
Yüksel | Analyzing the medium-interaction honeypot: A case study | |
Wurzenberger et al. | Maintainable Log Datasets for Evaluation of Intrusion Detection Systems | |
Jain et al. | Information security and auditing for distributed network |