期刊文献+

校园网的安全技术 被引量:4

The Security Technology of Campus Network
在线阅读 下载PDF
导出
摘要 随着我国教育部"信息技术课程"和"校校通"工程的进一步普及,学校都具备了网络环境。但同时校园网的网络安全问题也变得越来越突出起来。本文通过对校园网的安全风险分析,提出了网络安全防范和校园网建设的对策。 As Chinese Ministry of Education 's project of 'the Information Technology Course' and 'the Connection Between Universities' are popularized further, the universities have set up the network environ , But the problems of network security of the campus networks become more and more severe at the same time, is paper proposes the strategy of the protection of network safety and the construction of campus networks by yzing risks in security of campus network.
作者 崔晓斐
出处 《丹东纺专学报》 2004年第4期33-34,共2页 Journal of Dandong Textile College
  • 相关文献

参考文献1

二级参考文献8

  • 1Agarwal, Joshi. PNrule:.A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)A]. In Proceedings of the 1th SIAM International Conference on Data Mining[C], 2001
  • 2Sinclair. An Application of Machine Learning to Network Intrusion Detection[A]. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC'99)[C], 1999
  • 3Maloof, Michalski. AQPM: A System for Partial Memory Learning[A]. In Proceedings of the 8th Workshop on Intelligent Information Systems[C], 1999,70-79
  • 4Maloof. Selecting Examples for Partial Memory Learning[J]. Machine Learning, 2000,41(1)27-52
  • 5Wenke Lee, J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems[J]. ACM Trans. On Information and System Security, 2000,3(4):
  • 6Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz. A Data Mining Analysis of RTID Alarms[J]. Computer Networks, 2000,34:571-577
  • 7Schultz. Data mining Methods for Detection of New Malicious Executable[A]. In Proceedings of the 2001 IEEE Symposium on Security and Privacy [C], 2001
  • 8蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:371

共引文献9

同被引文献6

  • 1段海新.校园网安全问题分析与对策[J].中国教育网络,2005(3):22-25. 被引量:66
  • 2齐蕾.浅谈校园网安全控制策略[J].大众科技,2005,7(4):45-46. 被引量:16
  • 3[1]Lee D C,谈利群,张文海,等.网络安全实践[M].北京:人民邮电出版社,2004.
  • 4[6]王卫亚.计算机网络安全设计与研究[D].西安:长安大学,2005.
  • 5LEEDC.谈利群,张文海,等.网络安全实践[M].北京:人民邮电出版社,2004.
  • 6王卫亚.计算机网络安全设计与研究[D].西安:长安大学,2005.

引证文献4

二级引证文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部