[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jun et al., 2004 - Google Patents

Application of mobile scanning agent in the network security

Jun et al., 2004

View PDF
Document ID
15212640669546756021
Author
Jun M
Shan F
Chao T
Gang M
Publication year
Publication venue
Journal of Systems Engineering and Electronics

External Links

Snippet

To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Helmer et al. Lightweight agents for intrusion detection
US8566945B2 (en) System and method for testing web applications with recursive discovery and analysis
US7865938B2 (en) Enterprise-wide security system for computer devices
US7472421B2 (en) Computer model of security risks
Helmer et al. Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems
US20090328215A1 (en) Semantic networks for intrusion detection
Sekar et al. A specification-based approach for building survivable systems
EP2387746B1 (en) Methods and systems for securing and protecting repositories and directories
US12113824B2 (en) Distributed system for autonomous discovery and exploitation of an organization's computing
JP2007509389A (en) Method and apparatus for extensible and secure remote desktop access
Jun et al. Application of mobile scanning agent in the network security
Landauer et al. Maintainable log datasets for evaluation of intrusion detection systems
US11003790B2 (en) Preventing data leakage via version control systems
Ring et al. A toolset for intrusion and insider threat detection
US20220247774A1 (en) Methods and Systems for Accurately Assessing Application Access Risk
Bridges et al. How do information security workers use host data? a summary of interviews with security analysts
Humphries et al. Secure mobile agents for network vulnerability scanning
Snehi et al. IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects
Mokhov et al. Automating MAC spoofer evidence gathering and encoding for investigations
Rana et al. A dual attack tree approach to assist command and control server analysis of the red teaming activity
Jolkkonen Cloud Asset Identification Strategy
Hubballi et al. Event Log Analysis and Correlation: A Digital Forensic Perspective
Yüksel Analyzing the medium-interaction honeypot: A case study
Wurzenberger et al. Maintainable Log Datasets for Evaluation of Intrusion Detection Systems
Jain et al. Information security and auditing for distributed network