Life on the OS/network boundary

1993 ◽  
Vol 27 (2) ◽  
pp. 94-98 ◽  
Author(s):  
Larry L. Peterson
Keyword(s):  
2015 ◽  
Vol 44 (4) ◽  
pp. 381-382 ◽  
Author(s):  
Oliver Michel ◽  
Michael Coughlin ◽  
Eric Keller

2016 ◽  
Vol 100 ◽  
pp. 12-27 ◽  
Author(s):  
Ahmad Jakalan ◽  
Jian Gong ◽  
Qi Su ◽  
Xiaoyan Hu ◽  
Abdeldime M.S. Abdelgder

Author(s):  
John Wu ◽  
Yongdae Kim ◽  
Ryan Marotz ◽  
Ranga Ramanujan ◽  
James Tyra

Author(s):  
Vladimír Pažitka ◽  
Dariusz Wójcik

AbstractDespite the well-known dependence of vertex and network structural parameters on network boundary specification employed by researchers, there has so far been effectively no discussion of this methodological caveat in the global and world city literature. Given the reliance of empirical studies of urban networks on the sampling of underlying actors that form these networks by their interactions, we consider it of key importance to examine the dependence of network centralities of cities on network boundary specification. We consider three distinctive modelling approaches based on: (a) office networks, (b) ownership ties and (c) inter-organisational projects. Our results indicate that city network centralities obtained from sampled networks are highly consistent with those obtained from whole network analysis for samples featuring as little as 4% (office networks), 10% (ownership ties) and 25% (inter-organisational projects) of the underlying actors.


1992 ◽  
Author(s):  
Larry L. Peterson
Keyword(s):  

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 57633-57641 ◽  
Author(s):  
Yuzhen Zhang ◽  
Qing Li ◽  
Weicun Zhang ◽  
Yukun Liu ◽  
Zhuoer Xue

2012 ◽  
Vol 433-440 ◽  
pp. 4279-4283
Author(s):  
Xiao Bo Huang ◽  
Xiao Lin Huang ◽  
Quan Pu

To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing information leakage, techniques of identity authentication and content filtering are integrated into the mechanism of egress access control so that strategies with more flexibility in security auditing and access control can be implemented, which is effective to prevent the sensitive or secret data from leaking out and to trace the source of leakage.


Sign in / Sign up

Export Citation Format

Share Document