Fundamentals of Network Security
نویسنده
چکیده
منابع مشابه
Network Traffic Analysis and SCADA Security
20.1 Fundamentals of Network Traffic Monitoring and Analysis . . . . . . . . . . . . . . . . . . 384 20.1.1 What Are the Traffic Measurement Problems? . . . . . . . . . . . . . . . . . . . . . . . . . . 384 20.1.2 Traffic Matrix Measurement . . . . . . . . . . 385 20.1.3 Traffic VolumeMeasurement . . . . . . . . . 385 20.1.4 Traffic Dynamics Measurement . . . . . . . 385 20.1.5 Traffic Mixture ...
متن کاملStrategies to Overcome Network Congestion in Infrastructure Systems
Networked Infrastructure systems deliver services and/or products from point to point along the network. Demand for the services provided by such systems is typically cyclic, creating inefficiencies in capacity utilization. Congestion pricing provides incentives to shift demand from peak time periods to lower demand periods. This effectively increases the capacity of the system without the need...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002