Cloud computing-based forensic analysis for collaborative network security management system
Internet security problems remain a major challenge with many security concerns such as
Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network …
Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network …
Collaborative network security in multi-tenant data center for cloud computing
Z Chen, W Dong, H Li, P Zhang… - Tsinghua Science and …, 2014 - ieeexplore.ieee.org
A data center is an infrastructure that supports Internet service. Cloud computing is rapidly
changing the face of the Internet service infrastructure, enabling even small organizations to …
changing the face of the Internet service infrastructure, enabling even small organizations to …
A fast multi-pattern matching algorithm for deep packet inspection on a network processor
Deep Packet Inspection (DPI) is a critical function in network security applications such as
Firewalls and Intrusion Detection Systems (IDS). Signature based scanners used in DPI …
Firewalls and Intrusion Detection Systems (IDS). Signature based scanners used in DPI …
[PDF][PDF] Forensic Analysis for Effective Combine Attack Management System Based on Cloud Computing
We know that today's world stand also on the base of internet system. Though internet
problems with respect to its security such as internet worms spam, Trojan horse and …
problems with respect to its security such as internet worms spam, Trojan horse and …
[PDF][PDF] 基于特征码病毒扫描技术的研究
关欣, 朱冰, 陈震, 彭雪海 - 信息网络安全, 2013 - researchgate.net
随着互联网的快速发展, 病毒以极其迅猛的速度大量出现并蔓延. 病毒总数以爆炸性的速度增长.
因此, 增**对病毒的防范, 加**对反病毒技术的研究, 成为了当务之急. 本文研究病毒扫描技术 …
因此, 增**对病毒的防范, 加**对反病毒技术的研究, 成为了当务之急. 本文研究病毒扫描技术 …
[PDF][PDF] Runtime detection of active scanning worms
A Preston - 2008 - repository.library.carleton.ca
Abstract Intrusion Detection Systems for active scanning network worms is an active
research area. A wide range of approaches from packet content monitoring to statistical …
research area. A wide range of approaches from packet content monitoring to statistical …
[PDF][PDF] 基于 HBM 算法的高速反蠕虫引擎的设计实现
倪嘉, 林闯, 陈震 - 2007 - researchgate.net
基于HBM 算法的高速反蠕虫引擎的设计实现 Page 1 《电子技术应用》2007 年第8 期 欢迎订购《电子
技术应用》2000~2006 年合订光盘(010- 82306084) 随着Internet 规模的扩大, 网络安全已经 …
技术应用》2000~2006 年合订光盘(010- 82306084) 随着Internet 规模的扩大, 网络安全已经 …