Movatterモバイル変換


[0]ホーム

URL:


Lopes, 2013 - Google Patents

Methodologies for Integrated Network Monitoring

Lopes, 2013

ViewPDF
Document ID
7747168652721595863
Author
Lopes P
Publication year
Publication venue
PQDT-Global

External Links

Snippet

Dada a importância que as redes assumem nos dias de hoje, é fundamental garantir comunicações sem falhas e, nesta área, a gestão de redes tem tido um papel crucial através da utilização de diversas ferramentas de monitor-ização. A camada de Dados ea …
Continue reading atcore.ac.uk (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

PublicationPublication DateTitle
US9729567B2 (en)Network infrastructure obfuscation
US9680867B2 (en)Network stimulation engine
Buza et al.CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot
Urias et al.Supervisory Command and Data Acquisition (SCADA) system cyber security analysis using a live, virtual, and constructive (LVC) testbed
Trimananda et al.Vigilia: Securing smart home edge computing
Dalamagkas et al.A survey on honeypots, honeynets and their applications on smart grid
Li et al.Evaluation of security vulnerabilities by using ProtoGENI as a launchpad
Pfrang et al.Detecting and preventing replay attacks in industrial automation networks operated with profinet IO
Sangodoyin et al.DoS attack impact assessment on software defined networks
Ye et al.Retrofitting security and privacy measures to smart home devices
Batewela et al.Security Orchestration in 5G and Beyond Smart Network Technologies
KodzaiImpact of network security on SDN controller performance
Ortiz-Garcés et al.Automation tasks model for improving hardening levels on campus networks
LopesMethodologies for Integrated Network Monitoring
Urias et al.Experimental methods for control system security research
TahaSoftware-defined networking and its security
Aarøe et al.Adopting a cloud-based network: An assessment of Cisco Meraki's ease of implementation
Ariffin et al.Configuring Local Rule of Intrusion Detection System in Software Defined IoT Testbed
Nacshon et al.Rapid Penetration Test for Securing Channel APIs in Hybrid Cloud (Dynamic Defense of Channel API)
TaynorMonitoring a Small Network with SNMP
RanathungaAuto-configuration of critical network infrastructure
BirchCompTIA CASP+ CAS-004 Certification Guide: Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
KálmánSecurity implications of software defined networking in industrial control systems
Morales-GonzalezTowards Secure Building Automation: Analyzing Protocol Vulnerabilities and Developing an Innovative Fuzzing Tool
PolónioProactive Discovery and Mitigation of Security Vulnerabilities Leveraged by Software-Defined Networks

[8]
ページ先頭

©2009-2025 Movatter.jp