[go: up one dir, main page]

Jun et al., 2004 - Google Patents

Application of mobile scanning agent in the network security

Jun et al., 2004

View PDF
Document ID
15212640669546756021
Author
Jun M
Shan F
Chao T
Gang M
Publication year
Publication venue
Journal of Systems Engineering and Electronics

External Links

Snippet

To enhance the security of network systems, puts forward a kind of software agent is put forward, which has the induction ability of network frameworks and the ability of behavior independence. It is mobile scanning agent. More attentions is paid to expound how to …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
EP1716471B1 (en) System and method for testing web applications with recursive discovery and analysis
Helmer et al. Lightweight agents for intrusion detection
US7865938B2 (en) Enterprise-wide security system for computer devices
US7472421B2 (en) Computer model of security risks
Helmer et al. Software fault tree and coloured Petri net–based specification, design and implementation of agent-based intrusion detection systems
US20090328215A1 (en) Semantic networks for intrusion detection
EP2387746B1 (en) Methods and systems for securing and protecting repositories and directories
US20230015670A1 (en) Distributed system for autonomous discovery and exploitation of an organization's computing and/or human resources to evaluate capacity and/or ability to detect, respond to, and mitigate effectiveness of intrusion attempts by, and reconnaissance efforts of, motivated, antagonistic, third parties
JP2007509389A (en) Method and apparatus for extensible and secure remote desktop access
Jun et al. Application of mobile scanning agent in the network security
Ring et al. A toolset for intrusion and insider threat detection
Bridges et al. How do information security workers use host data? a summary of interviews with security analysts
Snehi et al. IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects
Humphries et al. Secure mobile agents for network vulnerability scanning
US20230319086A1 (en) Method, product, and system for network security management using a reasoning and inference engine
Liao et al. Managing networks through context: Graph visualization and exploration
Jain et al. Information security and auditing for distributed network
EP4414874A1 (en) Method, product, and system for network security management using a reasoning and inference engine
Rana et al. A dual attack tree approach to assist command and control server analysis of the red teaming activity
Hubballi et al. Event Log Analysis and Correlation: A Digital Forensic Perspective
Yüksel Analyzing the medium-interaction honeypot: A case study
Wurzenberger et al. Maintainable Log Datasets for Evaluation of Intrusion Detection Systems
Cattermole Smart object-oriented access control: Distributed access control for the Internet of Things
Dong et al. PM-IUBC: A P2P and MongoDB based Intranet User Behavior Control System.
Berger et al. Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility