ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Rigorous automated network security management
International Journal of Information Security
◽
10.1007/s10207-004-0052-x
◽
2005
◽
Vol 4
(1-2)
◽
pp. 29-48
◽
Cited By ~ 30
Author(s):
Joshua D. Guttman
◽
Amy L. Herzog
Keyword(s):
Network Security
◽
Security Management
◽
Network Security Management
Download Full-text
Related Documents
Cited By
References
Network Security Management (NSM) focused on Dispersed Generation
2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century
◽
10.1109/pes.2008.4596030
◽
2008
◽
Author(s):
Tom Hammons
◽
Zbigniew Styczynski
Keyword(s):
Network Security
◽
Security Management
◽
Dispersed Generation
◽
Network Security Management
Download Full-text
Network Security Management Technology Based on Port Collision
2010 2nd International Symposium on Information Engineering and Electronic Commerce
◽
10.1109/ieec.2010.5533214
◽
2010
◽
Author(s):
Mian Zhang
◽
Li Zhang
Keyword(s):
Network Security
◽
Security Management
◽
Management Technology
◽
Network Security Management
Download Full-text
Dynamic Link Anomaly Analysis for Network Security Management
Journal of Network and Systems Management
◽
10.1007/s10922-018-9478-8
◽
2018
◽
Vol 27
(3)
◽
pp. 600-624
◽
Cited By ~ 2
Author(s):
Tao Zhang
◽
Qi Liao
Keyword(s):
Network Security
◽
Security Management
◽
Anomaly Analysis
◽
Network Security Management
◽
Dynamic Link
Download Full-text
Awareness of Problems and Defies with Big Data Involved in Network Security Management with Revised Data Fusion-Based Digital Investigation Model
Big Data Analytics and Computing for Digital Forensic Investigations
◽
10.1201/9781003024743-7
◽
2020
◽
pp. 151-170
Author(s):
Sateesh Kumar Pradhan
◽
Satyasundara Mahapatra
◽
Chandrakant Mallick
Keyword(s):
Big Data
◽
Network Security
◽
Data Fusion
◽
Security Management
◽
Digital Investigation
◽
Network Security Management
Download Full-text
Orientation Research of Network Security Management in China
Proceedings of the 2015 International Conference on Education, Management, Information and Medicine
◽
10.2991/emim-15.2015.41
◽
2015
◽
Author(s):
Daoli Huang
◽
Hao Yuan
◽
Zhile He
Keyword(s):
Network Security
◽
Security Management
◽
Network Security Management
Download Full-text
A Multi-agents System for Network Security Management
Telecommunication Network Intelligence
◽
10.1007/978-0-387-35522-1_23
◽
2000
◽
pp. 407-418
◽
Cited By ~ 5
Author(s):
K. Boudaoud
◽
Zahia Guessoum
Keyword(s):
Network Security
◽
Security Management
◽
Network Security Management
◽
Multi Agents
Download Full-text
Cooperation-Based Trust Model and Its Application in Network Security Management
Algorithms and Architectures for Parallel Processing - Lecture Notes in Computer Science
◽
10.1007/978-3-642-24650-0_39
◽
2011
◽
pp. 453-459
Author(s):
Wu Liu
◽
Hai-xin Duan
◽
Ping Ren
Keyword(s):
Network Security
◽
Security Management
◽
Trust Model
◽
Network Security Management
Download Full-text
A Comparison of Mobile Agent and SNMP Message Passing for Network Security Management Using Event Cases
Lecture Notes in Computer Science - Autonomic Principles of IP Operations and Management
◽
10.1007/11908852_14
◽
2006
◽
pp. 156-167
◽
Cited By ~ 3
Author(s):
Ching-hang Fong
◽
Gerard Parr
◽
Philip Morrow
Keyword(s):
Network Security
◽
Mobile Agent
◽
Message Passing
◽
Security Management
◽
Network Security Management
Download Full-text
Digital Forensic Process Model for Information System and Network Security Management
2018 International Conference on Computational Science and Computational Intelligence (CSCI)
◽
10.1109/csci46756.2018.00020
◽
2018
◽
Author(s):
Ifeoma U. Ohaeri
◽
Bukohwo M. Esiefarienhe
Keyword(s):
Information System
◽
Network Security
◽
Process Model
◽
Security Management
◽
Digital Forensic
◽
Network Security Management
Download Full-text
Decision Support for Mission-Centric Network Security Management
NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium
◽
10.1109/noms47738.2020.9110261
◽
2020
◽
Author(s):
Michal Javornik
◽
Jana Komarkova
◽
Lukas Sadlek
◽
Martin Husak
Keyword(s):
Decision Support
◽
Network Security
◽
Security Management
◽
Network Security Management
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close