ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Azure Network Security Configuration
Cyber Security on Azure
◽
10.1007/978-1-4842-6531-4_2
◽
2020
◽
pp. 37-81
Author(s):
Marshall Copeland
◽
Matthew Jacobs
Keyword(s):
Network Security
◽
Security Configuration
Download Full-text
Related Documents
Cited By
References
Designing, optimizing, and evaluating network security configuration
NOMS 2008 - 2008 IEEE Network Operations and Management Symposium
◽
10.1109/noms.2008.4575105
◽
2008
◽
Cited By ~ 2
Author(s):
Ehab Al-Shaer
Keyword(s):
Network Security
◽
Security Configuration
Download Full-text
A comprehensive objective network security metric framework for proactive security configuration
Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead - CSIIRW '08
◽
10.1145/1413140.1413189
◽
2008
◽
Cited By ~ 8
Author(s):
Ehab Al-Shaer
◽
Latifur Khan
◽
Mohammad Salim Ahmed
Keyword(s):
Network Security
◽
Proactive Security
◽
Security Configuration
Download Full-text
Formal integrated network security analysis tool: formal query‐based network security configuration analysis
IET Networks
◽
10.1049/iet-net.2013.0090
◽
2015
◽
Vol 4
(2)
◽
pp. 137-147
◽
Cited By ~ 3
Author(s):
Soumya Maity
◽
P. Bera
◽
Soumya K. Ghosh
◽
Ehab Al‐Shaer
Keyword(s):
Network Security
◽
Security Analysis
◽
Analysis Tool
◽
Integrated Network
◽
Security Configuration
Download Full-text
A declarative approach for global network security configuration verification and evaluation
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
◽
10.1109/inm.2011.5990556
◽
2011
◽
Cited By ~ 2
Author(s):
Mohammad Ashiqur Rahman
◽
Ehab Al-Shaer
Keyword(s):
Network Security
◽
Global Network
◽
Security Configuration
Download Full-text
Authorship Pattern and Collaborative Research in the Field of Network Security
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/21
◽
2011
◽
Vol 3
(1)
◽
pp. 52-54
◽
Cited By ~ 1
Author(s):
N. Amsaveni N. Amsaveni
◽
◽
R. Vasanthi R. Vasanthi
Keyword(s):
Network Security
◽
Collaborative Research
◽
Authorship Pattern
Download Full-text
COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v69.i7.50
◽
2010
◽
Vol 69
(7)
◽
pp. 629-638
Author(s):
J. Sisniega-Gonzalez
◽
E. Aguirre-Anaya
◽
Mariko Nakano-Miyatake
◽
Hector Manuel Perez-Meana
Keyword(s):
Network Security
◽
Security Analysis
Download Full-text
REAL-TIME TRAFFIC DETECTION AND ANALYSIS OF NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v79.i12.30
◽
2020
◽
Vol 79
(12)
◽
pp. 1055-1062
Author(s):
A. L. Zhou
Keyword(s):
Network Security
◽
Real Time
◽
Intrusion Prevention
◽
Real Time Traffic
◽
Prevention System
◽
Intrusion Prevention System
◽
Traffic Detection
Download Full-text
Rule Based Network Security Using Genetic Algorithm
i-manager’s Journal on Software Engineering
◽
10.26634/jse.1.4.760
◽
2007
◽
Vol 1
(4)
◽
pp. 85-91
Author(s):
Jeya S
◽
◽
Ramar K
◽
Keyword(s):
Genetic Algorithm
◽
Network Security
◽
Rule Based
Download Full-text
Information technology. Security techniques. Network security
10.3403/30168527u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close