Jun et al., 2004 - Google Patents
Application of mobile scanning agent in the network securityJun et al., 2004
View PDF- Document ID
- 15212640669546756021
- Author
- Jun M
- Shan F
- Chao T
- Gang M
- Publication year
- Publication venue
- Journal of Systems Engineering and Electronics
External Links
Snippet
To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to …
- 230000002708 enhancing 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1716471B1 (en) | System and method for testing web applications with recursive discovery and analysis | |
Helmer et al. | Lightweight agents for intrusion detection | |
US7865938B2 (en) | Enterprise-wide security system for computer devices | |
US7472421B2 (en) | Computer model of security risks | |
Helmer et al. | Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems | |
US20090328215A1 (en) | Semantic networks for intrusion detection | |
EP2387746B1 (en) | Methods and systems for securing and protecting repositories and directories | |
US20230015670A1 (en) | Distributed system for autonomous discovery and exploitation of an organization's computing and/or human resources to evaluate capacity and/or ability to detect, respond to, and mitigate effectiveness of intrusion attempts by, and reconnaissance efforts of, motivated, antagonistic, third parties | |
JP2007509389A (en) | Method and apparatus for extensible and secure remote desktop access | |
Jun et al. | Application of mobile scanning agent in the network security | |
Ring et al. | A toolset for intrusion and insider threat detection | |
Bridges et al. | How do information security workers use host data? a summary of interviews with security analysts | |
Snehi et al. | IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects | |
Humphries et al. | Secure mobile agents for network vulnerability scanning | |
US20230319086A1 (en) | Method, product, and system for network security management using a reasoning and inference engine | |
Liao et al. | Managing networks through context: Graph visualization and exploration | |
Jain et al. | Information security and auditing for distributed network | |
EP4414874A1 (en) | Method, product, and system for network security management using a reasoning and inference engine | |
Rana et al. | A dual attack tree approach to assist command and control server analysis of the red teaming activity | |
Hubballi et al. | Event Log Analysis and Correlation: A Digital Forensic Perspective | |
Yüksel | Analyzing the medium-interaction honeypot: A case study | |
Wurzenberger et al. | Maintainable Log Datasets for Evaluation of Intrusion Detection Systems | |
Cattermole | Smart object-oriented access control: Distributed access control for the Internet of Things | |
Dong et al. | PM-IUBC: A P2P and MongoDB based Intranet User Behavior Control System. | |
Berger et al. | Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility |