The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Campus network encounters serious security threats because of its expandable size and curious users. Due to the dramatic increase of network technologies and the urgent need to perform the work accurately, campus network is one example that now compels to step in with new trends confronted. This could be adopting robust technologies in order to reach high security, availability and globality. Standing...
Evaluation of campus network security is a complicated systematic project. The paper analyzes the reasons of the questions, obtains the solving method, and at last builds the M(1,2,3) model without the interference of redundant data, which is different from )M(g+) and is a nonlinear model. The paper will apply the new algorithm in the fuzzy evaluation on campus network security.
With the gradual popularization of the Internet, campus network construction has become more sophisticated, to the intelligent direction. Apart from that, the campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated,...
With the rapid development of wireless technology, WLAN technology is gradually integrate and replace the LAN technology, which has played an important role in promoting the development of campus information technology, will be an important component in campus network. Build a stable, safe, efficient, convenient wireless campus network has become the inevitable trend of development and construction...
In the Age of Information, network education pays more attention to the application of IT technology and the training of talents, which makes learning more of customization and of opening up. In order to better enable learners to go beyond the limitations of space and time to acquire knowledge; in order to provide excellent learning environment for greater freedom and greater choice of learning activities...
The campus network is the birthplace of a large number of attacks, and also the attacker's objective that is most easily broken. How to build up an effective technical system to support emergency response under the current state of lower invests in maintaining the campus network Yecurity is an issue worth studying. An emergency response log has been designed to record each emergency incident response...
With the rapid development of wireless technology, WLAN(Wireless Local Area Network) technology is gradually integrate and replace the LAN technology, has played an important role in promoting the development of campus information technology, will be an important component in campus network. Build a stable, safe, efficient, convenient wireless campus network has become the inevitable trend of development...
This paper firstly analyzed the current complicated campus network security condition especially its' active protection; then introduced principle of UTM (United Threat Management), and applied Multi-Core UTM technology in BIGC campus network at last made a related analysis and research of this project.
This paper first introduces network security and the conventional firewall technology and points out the problems that the conventional firewalls faced. Then lucubrate the structure, key technologies and advantages of the distributed firewalls. Presents a secure model of campus network based on a distributed firewall that deals with the features of campus network directly, and set forth the advantage...
The core of fuzzy evaluation on campus network security is membership degree transformation. But the existing transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information...
Through mathematical analysis, the primary components analysis (PCA) is used to analyze the effect of influential factors on campus network security (CNS). Based on PCA model and, the results are computed. Through case study, it can be seen that some factors and characteristics play very important role in influencing CNS and all factors should be considered because the effect depends on the factors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.