Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Knowledge and Technology》 2010-12
Add to Favorite Get Latest Update

Research on Evaluation of Network Security

XU Hai(Guizhou University of Science and Technology,Guiyang 550025,China)  
The reliability of a network system is much more depending on the safeguard of the system.It is necessary for us to study how to enforce the safeguards against attacks.In this paper,a evaluate system of network security risk is trying to evaluate the risk of a network system.The key technologies applied in the evaluate system of network security risk is frangibility analysis and evaluation of network security.Frangibility,criterions of deciding risk levels and the method to evaluate network risk is described.
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 Xiao Daoju Yang Sujuan Zhou Kaifeng Chen Xiaosu College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;A study of evaluation model for network security[J];Journal of Huazhong University of Science and Technology;2002-04
2 CHENG Weiqing1,2,GONG Jian1 (1.Computer Science Dept., Southeast University, Nanjing 210096; 2.Dept. of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003);Network Security Evaluation[J];Computer Engineering;2003-02
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WANG Gai-xiang(Shanxi Professional College of Finance,Taiyuan 030008,China);A Brief Analysis on the Security Strategy of E-business[J];Computer Knowledge and Technology;2008-30
2 HUANG Li-min1,WANG Hua2 (College of Computer Science and Technology,Shandong University,Jinan 250100,China);Multilevel fuzzy comprehensive evaluation method of network security[J];Journal of Liaoning Technical University;2004-04
3 Man Dapeng,Yang Wu,Yang Yongtian,Zhou Yuan~*,Zhang Bing~* Information Security Research Center,Harbin Engineering University,Harbin 150001 ~* National Computer Network Emergency Response Technical Team/Coordination Center of China,Beijing 100029;Network security evaluation based on vulnerability correlation and security requirements[J];Chinese High Technology Letters;2009-02
4 Sun Baiyong Xiang Jianwei Mo Zhengkun Chen Xiaosu Sun Baiyong Lect.; College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;The analysis of security holes in interface of web servers and its detection[J];Journal of Huazhong University of Science and Technology;2003-03
5 YANG Xu-dong(the Department of Computer Science,Luliang Supreme Normal School,Luliang Shanxi,033000);An Analysis of Network Security Risk Assessment[J];Journal of Changzhi University;2007-05
6 XU Guang (Hainan Tobacco Information Centre,Haikou 570105);Construction of the Infomation Security Safeguard System on the Province Level in Tobacco Industiy[J];Computer Engineering;2004-22
7 YAO Shuping Laboratory of Computer Network Defense Technology, Beijing Institute of Technology, Beijing 100081, China;Research on Network Security Evaluation Technology Based on Attack-defense Confrontation[J];Science & Technology Review;2007-07
8 CHEN Chenzi (Shanghai University of Finance and Economics,Information Management and Engineering Institute,Shanghai 200433,China);Research of Electronic Commerce Security Issues[J];Journal of Nanjing University of Finance and Economics;2009-01
9 LI Fa-ze,HU Gang-dun(School of Physics and Electrical Information Science,Ningxia University,Yinchuan 750021,China);A model for quantitative risk grade evaluation[J];Ningxia Engineering Technology;2006-02
10 HU Han-Ping+, CHEN Xiang, ZHANG Bao-Liang, GUO Wen-Xuan (Institute for Pattern Recognition and Artificial Intelligence, Huazhong University of Science and Technology, Wuhan 430074, China);An Approach to Measure and Evaluate the Network Security[J];Journal of Software;2005-11
China Proceedings of conference Full-text Database 1 Hits
1 Ding Hao~1 Zhong Qiu-xi~2 School of Computer Science,National University of Defense Technology 410073;Design and Implementation of the Framework for Security Management Based on CIM[A];[C];2008
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved