Foundations for Cyber Zone Defense
暂无分享,去创建一个
[1] Cao Wantian,et al. Intelligent communication network research of isolation security model based on the anomaly detection , 2014, Proceedings of 2nd International Conference on Information Technology and Electronic Commerce.
[2] Ming Liu,et al. Type Based Network Isolation Against Net Virus , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[3] Otto Carlos Muniz Bandeira Duarte,et al. Virtual networks: isolation, performance, and trends , 2011, Ann. des Télécommunications.
[4] Yeu-Pong Lai,et al. Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard , 2007, NBiS.
[5] Athanasios V. Vasilakos,et al. Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..
[6] R. Subramanian,et al. Innovative and effective methodology for implementing network isolation for manufacturing environments , 2005, ISSM 2005, IEEE International Symposium on Semiconductor Manufacturing, 2005..
[7] Wm. Arthur Conklin. State Based Network Isolation for Critical Infrastructure Systems Security , 2015, 2015 48th Hawaii International Conference on System Sciences.
[8] Luís Henrique Maciel Kosmalski Costa,et al. Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments , 2015, Journal of Internet Services and Applications.
[9] Dorgival O. Guedes,et al. Virtualized network isolation using Software Defined Networks , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[10] Hongliang Liang,et al. A Lightweight Security Isolation Approach for Virtual Machines Deployment , 2014, Inscrypt.
[11] Iñigo Cuiñas,et al. Using Vegetation Barriers to Improving Wireless Network Isolation and Security , 2008, ICETE.
[12] Seth Bullock,et al. Improving measures of topological robustness in networks of networks and suggestion of a novel way to counter both failure propagation and isolation , 2015 .
[13] Sandia Report,et al. Complexity Science Challenges in Cybersecurity , 2009 .
[14] Yong Zhao,et al. Research on the Application Security Isolation Model , 2010, e-Forensics.