期刊文献+
共找到599篇文章
< 1 2 30 >
每页显示 20 50 100
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture 被引量:1
1
作者 Zhizhong Yin Long Zhang +2 位作者 Xianwei Zhou Peng Xu Yu Deng 《International Journal of Communications, Network and System Sciences》 2010年第4期355-363,共9页
Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite netwo... Most recent satellite network research has focused on providing routing services without considering security. In this paper, for the sake of better global coverage, we introduce a novel triple-layered satellite network architecture including Geostationary Earth Orbit (GEO), Highly Elliptical Orbit (HEO), and Low Earth Orbit (LEO) satellite layers, which provides the near-global coverage with 24 hour uninterrupted over the areas varying from 75° S to 90° N. On the basis of the hierarchical architecture, we propose a QoS-guaranteed secure multicast routing protocol (QGSMRP) for satellite IP networks using the logical location concept to isolate the mobility of LEO and HEO satellites. In QGSMRP, we employ the asymmetric cryptography to secure the control messages via the pairwise key pre-distribution, and present a least cost tree (LCT) strategy to construct the multicast tree under the condition that the QoS constraints are guaranteed, aiming to minimize the tree cost. Simulation results show that the performance benefits of the proposed QGSMRP in terms of the end-to-end tree delay, the tree cost, and the failure ratio of multicasting connections by comparison with the conventional shortest path tree (SPT) strategy. 展开更多
关键词 SATELLITE networks security MULTICAST ROUTING Quality of Service HIERARCHICAL architecture
在线阅读 下载PDF
Research on IPv6 Transition Evolvement and Security Architecture of Smart Distribution Grid Data Communication System
2
作者 Xin Miao Xi Chen 《Journal of Energy and Power Engineering》 2012年第1期146-149,共4页
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe... Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems. 展开更多
关键词 Smart distribution grid data communication network IPV6 transition evolvement safety threaten security architecture.
在线阅读 下载PDF
Study of An Integrated Security Solution for Network Information System
3
作者 Yangqing Zhu 《通讯和计算机(中英文版)》 2006年第3期35-39,56,共6页
在线阅读 下载PDF
Cloud-Network-End Collaborative Security for Wireless Networks:Architecture,Mechanisms,and Applications
4
作者 Xiangyu Wang Jianfeng Ma 《Tsinghua Science and Technology》 2025年第1期18-33,共16页
The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advance... The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively. 展开更多
关键词 wireless network security information services security secure semantic communication model cloud-network-end collaborative security architecture heterogeneous network secure convergence
原文传递
The Analysis of the Structure and Security of Home Control Subnet
5
作者 Chengyi WANG Yun ZHANG 《Wireless Sensor Network》 2009年第1期56-60,共5页
A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-... A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-atic analysis of the structure and function of home control subnet based on the general model of home net-work. The paper has also analyzed two types of major equipment, namely sub-gateways and terminal equip-ment. The major networking technology used in home control subnet is summarized and concluded. In com-bination with relationship among home control subnet, home network, as well as the outside main network, the paper has systematically studied various safety problems related to home control gateways and the possi-ble solutions to those problems have been made. 展开更多
关键词 HOME network HOME Control SUBNET network architecture network security
暂未订购
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
6
作者 Tala Talaei Khoei Hadjar Ould Slimane Naima Kaabouch 《Communications and Network》 2022年第4期119-170,共52页
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba... One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions. 展开更多
关键词 Smart Grid architecture Cyber-Attacks network security CONFIDENTIALITY Integrity Availability ACCOUNTABILITY Countermeasures Detection Techniques
在线阅读 下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information security network security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security architecture
在线阅读 下载PDF
网络靶场研究进展
8
作者 李馥娟 王群 《信息网络安全》 北大核心 2026年第3期355-366,共12页
网络靶场作为网络空间安全研究的核心实验平台,通过构建可控、可复现的虚拟化攻防环境,为安全技术验证、人才培养及攻防演练提供了关键支撑。文章系统梳理了网络靶场的发展脉络,从美国NCR、欧洲CRF到日本StarBED,展现了从单一功能平台... 网络靶场作为网络空间安全研究的核心实验平台,通过构建可控、可复现的虚拟化攻防环境,为安全技术验证、人才培养及攻防演练提供了关键支撑。文章系统梳理了网络靶场的发展脉络,从美国NCR、欧洲CRF到日本StarBED,展现了从单一功能平台向联邦协同架构的演进历程,同时阐述了国内网络靶场从技术验证到协同创新的跨越式发展路径。在技术架构方面,网络靶场呈现多层级体系特征,涵盖基础设施层、虚拟化层、容器层等核心组件,通过虚拟化与仿真技术实现高保真环境构建。关键技术聚焦于场景生成与对抗、跨域协同及自动化评估3大方向,形成了完整的技术支撑体系。研究表明,网络靶场已从静态仿真容器升级为动态能力生成平台,应用场景拓展至联邦态势感知、供应链安全溯源等领域。 展开更多
关键词 网络空间安全 网络靶场 网络仿真 技术架构
在线阅读 下载PDF
Navigating the Digital Twin Network landscape:A survey on architecture,applications,privacy and security 被引量:2
9
作者 Akshita Maradapu Vera Venkata Sai Chenyu Wang +1 位作者 Zhipeng Cai Yingshu Li 《High-Confidence Computing》 2024年第4期129-149,共21页
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization ... In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security. 展开更多
关键词 Digital Twin networks network architecture Privacy and security Federated learning Blockchain Internet of Vehicles 6G Supply chain
在线阅读 下载PDF
网络APT攻击检测关键技术与防护要点研究
10
作者 张君鹏 兰赟 +3 位作者 贾亮 陈鹏 李晨瑄 于佳玉 《航天技术与工程学报》 2026年第2期28-34,共7页
为了提升网络高级可持续性威胁(APT)攻击的防御和检测能力,提高网络攻击应急响应与溯源处置效率,在分析网络APT攻击特征和高价值目标网络特征的基础上,研究了基于Ring0驱动级主机行为检测、异常流量检测以及蜜罐诱捕技术的网络APT攻击... 为了提升网络高级可持续性威胁(APT)攻击的防御和检测能力,提高网络攻击应急响应与溯源处置效率,在分析网络APT攻击特征和高价值目标网络特征的基础上,研究了基于Ring0驱动级主机行为检测、异常流量检测以及蜜罐诱捕技术的网络APT攻击检测技术,从终端检测、网络检测和边界检测层面对网络APT攻击检测的关键技术进行了分析,探索了海量异构的威胁情报知识图谱构建和基于多特征融合的关联同源分析的关键技术,从组织机制、体系架构、防护方法和重点措施等层面对网络APT攻击的防护体系要点进行了分析研究,形成了应对网络APT攻击的全生态链检测分析要点。为网络APT攻击的链溯源、威胁态势感知、威胁情报生成以及后续各信息系统的安全协同防御提供了解决思路。 展开更多
关键词 网络APT攻击 高价值目标网络 威胁知识图谱 多特征融合 内网安全架构
在线阅读 下载PDF
H-R网络安全系统结构
11
作者 李涛 李之棠 《计算机工程与科学》 CSCD 2003年第3期40-43,47,共5页
文章首先分析了等级式+环形体系结构的特点,并在此基础上提出分布式安全体系结构方案:H R网络安全系统结构。通过使用等级式结构,保证整个体系良好的可扩展性;通过使用安全令牌环协议(运行在环型结构中),提高体系结构的健壮性,并简单介... 文章首先分析了等级式+环形体系结构的特点,并在此基础上提出分布式安全体系结构方案:H R网络安全系统结构。通过使用等级式结构,保证整个体系良好的可扩展性;通过使用安全令牌环协议(运行在环型结构中),提高体系结构的健壮性,并简单介绍了安全令牌环协议的实现。最后对该体系结构进行了分析。 展开更多
关键词 h-r网络 网络安全系统 系统结构 计算机网络 防火墙
在线阅读 下载PDF
一种基于多智能体架构的自动化渗透测试系统
12
作者 董英娟 吕萍 刘兵 《信息网络安全》 北大核心 2026年第4期654-664,共11页
近年来,网络攻击呈现高度组织化和自动化趋势。在以大语言模型为主的人工智能技术加持下,攻击者能够快速编写和派生恶意代码,并基于僵尸网络构建针对特定目标的自动化和分布式的侦查与攻击流程,给网络安全防护带来了威胁和挑战。为有效... 近年来,网络攻击呈现高度组织化和自动化趋势。在以大语言模型为主的人工智能技术加持下,攻击者能够快速编写和派生恶意代码,并基于僵尸网络构建针对特定目标的自动化和分布式的侦查与攻击流程,给网络安全防护带来了威胁和挑战。为有效应对以上挑战,文章提出并设计一种基于多智能体架构的自动化渗透测试系统,将传统渗透测试任务拆解为具有原子性的子任务,并交由各智能体联合完成。实验结果表明,该系统在多项测试指标上均显著领先于传统漏洞扫描工具,能够全面识别被测信息系统中的多类型安全漏洞,并为漏洞披露提供高度可信的证据链。此外,该系统能够生成可执行的修复建议,实现渗透测试流程的自动化与工程化,为机构开展常态化网络安全漏洞管理工作提供一种先进、高效和稳定的解决方案。 展开更多
关键词 渗透测试系统 多智能体架构 自主任务规划 系统与网络安全
在线阅读 下载PDF
基于PCA-RNN的计算机危险因子入侵检测
13
作者 胡立超 李孟毅 《微型电脑应用》 2026年第2期214-218,共5页
针对传统入侵检测方法在捕获复杂计算机危险行为方面存在的局限性,对此提出一种主成分分析—循环神经网络(PCA-RNN)的计算机危险因子入侵检测方法。所提出的方法通过采集Kubernetes架构当中的用户行为和状态,构建用户行为特征,并采用PC... 针对传统入侵检测方法在捕获复杂计算机危险行为方面存在的局限性,对此提出一种主成分分析—循环神经网络(PCA-RNN)的计算机危险因子入侵检测方法。所提出的方法通过采集Kubernetes架构当中的用户行为和状态,构建用户行为特征,并采用PCA对其进行降维归一化处理,利用RNN对计算机危险因子入侵进行检测。采用Podsecure监控系统对Kubernetes架构内部进程进行权限监测,可管理访问用户的各项权限,提高对异常进程的检测能力。使用可多级保护的K8Safe存储系统,采用独立和可自检的存储服务器、地址服务器和缓存服务器,为容器的运行和存储提供多层安全保障。实验结果表明,所提出的方法对计算机危险因子入侵检测的检测率能达到97.32%,召回率能达到91.04%,误报率为4.52%,内存和利用率均在正常范围内,为计算机危险因子的入侵检测提供一份可行方案。 展开更多
关键词 Kubernetes架构 入侵检测 主成分分析 神经网络 网络安全
在线阅读 下载PDF
基于零信任架构的网络安全防御系统的设计与实现
14
作者 杜奕霖 罗海涛 +2 位作者 黄炜 王伟奇 黄华豪 《移动信息》 2026年第2期82-84,共3页
随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零... 随着云计算、大数据和移动互联网的广泛应用,传统的“边界防御”安全模型已难以应对日益复杂的网络攻击。零信任架构以“永不信任、持续验证”为核心理念,通过多种机制实现纵深防御。文中结合高校实际网络环境,设计并实现了一种基于零信任架构的网络安全防御系统。在系统实现部分,引入基于动态信任评分模型、策略自适应调整模型以及风险—收益优化模型,使系统能够在复杂网络环境下实现“持续验证—动态调节—平衡取舍”的完整防御逻辑。最后,以某高校校园网为案例进行了测试。结果表明,该系统在降低入侵风险,提升访问安全性方面具有良好效果,为高校及其他组织的网络安全建设提供了参考。 展开更多
关键词 零信任架构 网络安全 身份认证 访问控制 高校网络
在线阅读 下载PDF
网络攻击与防护技术在云计算环境中的应用
15
作者 丁世红 《中国高新科技》 2026年第4期71-73,共3页
针对云计算环境面临的网络安全威胁,深入研究了云平台中的主要网络攻击类型及防护技术应用。基于私有云平台构建实验环境,分析了分布式拒绝服务攻击、SQL注入、跨站脚本攻击等典型攻击形式的特点及影响。设计并实现了包括流量清洗、入... 针对云计算环境面临的网络安全威胁,深入研究了云平台中的主要网络攻击类型及防护技术应用。基于私有云平台构建实验环境,分析了分布式拒绝服务攻击、SQL注入、跨站脚本攻击等典型攻击形式的特点及影响。设计并实现了包括流量清洗、入侵检测、Web应用防火墙在内的多层次防护方案,将防护技术与云平台特性深度融合。实验结果表明,该方案可有效识别和防御95%以上的网络攻击,系统性能损耗低于8%。研究成果已在多个政务云平台得到实践应用,显著提升了云环境的安全防护能力。 展开更多
关键词 云计算安全 网络攻击防护 入侵检测 安全架构 应用实践
在线阅读 下载PDF
网络安全防护技术在智能电力调度中的应用
16
作者 高艳珊 陈思 《移动信息》 2026年第2期92-94,共3页
为提升智能电力调度系统在复杂网络环境中的安全防护能力与运行韧性,文中采用分层架构建模与技术机制融合的方法,系统分析了调度平台面临的主要威胁,提出了基于网络架构安全、数据加密传输、身份认证与入侵防御等关键技术的协同防护体系... 为提升智能电力调度系统在复杂网络环境中的安全防护能力与运行韧性,文中采用分层架构建模与技术机制融合的方法,系统分析了调度平台面临的主要威胁,提出了基于网络架构安全、数据加密传输、身份认证与入侵防御等关键技术的协同防护体系,并结合典型应用场景与实测性能数据对其进行了验证。结果表明,该体系可有效提升系统稳定性、攻击识别精度与响应效率,具备良好的工程适用性与推广价值。 展开更多
关键词 智能电力调度 网络安全 系统架构
在线阅读 下载PDF
下一代信息网络架构研究及其发展趋势分析
17
作者 姬志凯 潘崴 《计算机应用文摘》 2026年第7期165-167,共3页
随着人工智能、大数据、云计算、物联网及区块链等新兴技术的快速发展,传统信息网络在性能、可扩展性与安全性方面已难以满足未来应用需求。为应对这一挑战,下一代信息网络架构(Next Generation Information Network Architecture,NGINA... 随着人工智能、大数据、云计算、物联网及区块链等新兴技术的快速发展,传统信息网络在性能、可扩展性与安全性方面已难以满足未来应用需求。为应对这一挑战,下一代信息网络架构(Next Generation Information Network Architecture,NGINA)应运而生。文章从体系结构、关键技术与应用场景出发,对下一代信息网络的研究现状进行综述,分析其发展趋势,并提出可能的演进方向。研究表明,未来信息网络将呈现智能化、可编程化、去中心化及绿色可持续等发展特征,这对推动新型数字基础设施建设具有重要意义。 展开更多
关键词 下一代信息网络 架构设计 人工智能 网络安全 发展趋势
在线阅读 下载PDF
基于大数据架构的态势感知在海洋网络安全防御中的应用
18
作者 谢硕 王晓瑞 +2 位作者 吴永芳 司佳 张学灵 《海洋信息技术与应用》 2026年第1期50-57,共8页
本文在总结态势感知技术现有研究成果的基础上,借鉴其他行业单位的应用经验,提出了一种符合海洋网络运维实际情况、基于大数据架构的网络安全态势感知模型,并将该模型应用于海洋网络的安全防御中。应用实践表明,海洋态势感知系统能全方... 本文在总结态势感知技术现有研究成果的基础上,借鉴其他行业单位的应用经验,提出了一种符合海洋网络运维实际情况、基于大数据架构的网络安全态势感知模型,并将该模型应用于海洋网络的安全防御中。应用实践表明,海洋态势感知系统能全方位展示资产脆弱性、访问关系等海洋网络安全态势,实现安全防护工作由被动防御向主动监管的转变。 展开更多
关键词 大数据架构 态势感知 海洋网络 安全分析
在线阅读 下载PDF
基于零信任的高校图书馆网络架构研究
19
作者 何戈锐 《科技资讯》 2026年第1期235-237,共3页
高校图书馆作为数据安全防护的重要关注对象,在网络安全上面临物理网络边界模糊、内部威胁激增、数字资源不可控等挑战。本文提出将零信任应用于高校图书馆网络架构中,智能网关和认证服务器持续验证和审查所有网络请求,并实施最小权限控... 高校图书馆作为数据安全防护的重要关注对象,在网络安全上面临物理网络边界模糊、内部威胁激增、数字资源不可控等挑战。本文提出将零信任应用于高校图书馆网络架构中,智能网关和认证服务器持续验证和审查所有网络请求,并实施最小权限控制,入侵防护系统(Intrusion Prevention System,IPS)和入侵检测系统(Intrusion Detection System,IDS)联合阻断和追踪恶意流量,安全子域之间禁止直通,大大减小了内部威胁。零信任网络安全架构的实施能够提升高校图书馆网络的安全性,有效应对当前所面临的困境。 展开更多
关键词 零信任架构 高校图书馆 网络安全 智能网关
在线阅读 下载PDF
基于B/S架构的网络安全等级保护测评系统设计与实现方法
20
作者 雷雪 刘泓然 《科技创新与应用》 2026年第8期137-140,共4页
在我国网络安全领域,网络安全等级保护发挥着重要作用,为提升等级保护测评系统的功能性,得出精准、可靠的测评结果,选取B/S架构作为等级保护测试系统的构建基础,设计具有用户交互、业务逻辑处理、数据访问3个不同功能的结构层次,并依次... 在我国网络安全领域,网络安全等级保护发挥着重要作用,为提升等级保护测评系统的功能性,得出精准、可靠的测评结果,选取B/S架构作为等级保护测试系统的构建基础,设计具有用户交互、业务逻辑处理、数据访问3个不同功能的结构层次,并依次开展系统运行环境、功能模块、数据库的设计。共设置五大功能,即用户管理、数据库管理、项目管理、日志审计、自动测评。然后分别给出系统各个功能及数据库的实现方法,所设计的系统能满足自动测评要求,结合运用单向分析、综合分析2种方法展开测评分析,可为网络安全等级保护工作的科学开展提供可靠的支持。 展开更多
关键词 网络安全 B/S架构 等级保护 测评系统 设计实现
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部