메뉴 건너뛰기




Volumn , Issue , 2008, Pages

On implementing real-time detection techniques in future network access control (NAC)

Author keywords

Antivirus retention; Network access control; Network security perimeter; Network switch security; Security framework

Indexed keywords

ACCESS CONTROL; COMMUNICATION; COMPUTER PROGRAMMING LANGUAGES; CONTROL SYSTEMS; INTERNET; SECURITY SYSTEMS; SOFTWARE ARCHITECTURE; TECHNOLOGY;

EID: 49249130114     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICTTA.2008.4530293     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 1
    • 33751119325 scopus 로고    scopus 로고
    • Hae-Jin Jeong; Il-Seop Song; et-al; A Multi-dimension Rule Update in a TCAM-based High-Performance Network Security SystemAdvanced Information Networking and Applications, 2006. AINA 2006, 20th International Conference on 2, 18-20 April 2006 Page(s):62 - 66
    • Hae-Jin Jeong; Il-Seop Song; et-al; "A Multi-dimension Rule Update in a TCAM-based High-Performance Network Security System"Advanced Information Networking and Applications, 2006. AINA 2006, 20th International Conference on Volume 2, 18-20 April 2006 Page(s):62 - 66
  • 2
    • 34250787999 scopus 로고    scopus 로고
    • Network Security Policies: Verification, Optimization and Testing Network Operations and Management Symposium, 2006. NOMS 2006
    • Pages
    • Al-Shaer, E; "Network Security Policies: Verification, Optimization and Testing" Network Operations and Management Symposium, 2006. NOMS 2006, 10th IEEE/IFIP, 2006 Page(s):584 - 584
    • (2006) 10th IEEE/IFIP , pp. 584-584
    • Al-Shaer, E.1
  • 3
    • 49249095232 scopus 로고    scopus 로고
    • Magic quadrant, Symantec network access control; the key to endpoint security advertising section report 2006, www.symantec.com/ endpoint
    • Magic quadrant, "Symantec network access control; the key to endpoint security" advertising section report 2006, www.symantec.com/ endpoint
  • 4
    • 33645337636 scopus 로고    scopus 로고
    • Taxonomy of conflicts in network security policies
    • March Pages
    • Hamed, H.; Al-Shaer, E; "Taxonomy of conflicts in network security policies" Communications Magazine, IEEE, Volume 44, Issue 3, March 2006 Page(s):134-141
    • (2006) Communications Magazine, IEEE , vol.44 , Issue.3 , pp. 134-141
    • Hamed, H.1    Al-Shaer, E.2
  • 5
    • 33750947289 scopus 로고    scopus 로고
    • Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit Advanced Communication Technology, 2006. ICACT 2006
    • 20-22 Feb, Pages
    • Salim, R.; Rao, G.S.V.R.K;" Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit" Advanced Communication Technology, 2006. ICACT 2006, the 8th International Conference, Volume 2, 20-22 Feb. 2006 Page(s):1023-1025
    • (2006) the 8th International Conference , vol.2 , pp. 1023-1025
    • Salim, R.1    Rao, G.S.V.R.K.2
  • 7
    • 33749063636 scopus 로고    scopus 로고
    • Characterizing sources and remedies for packet loss in network intrusion detection systems Workload Characterization Symposium, 2005
    • 6-8 Oct, Pages
    • Schaelicke, L.; Freeland, J.C.; "Characterizing sources and remedies for packet loss in network intrusion detection systems" Workload Characterization Symposium, 2005. Proceedings of the IEEE International 6-8 Oct. 2005 Page(s):188 - 196
    • (2005) Proceedings of the IEEE International , pp. 188-196
    • Schaelicke, L.1    Freeland, J.C.2
  • 8
    • 28444457772 scopus 로고    scopus 로고
    • Jiang-Neng Yi; Wei-Dong Meng; Wei-Min Ma; Jin-Jun Du; Assess model of network security based on analytic network process Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on 1, 18-21 Aug. 2005 Page(s):27-32 1
    • Jiang-Neng Yi; Wei-Dong Meng; Wei-Min Ma; Jin-Jun Du; "Assess model of network security based on analytic network process" Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on Volume 1, 18-21 Aug. 2005 Page(s):27-32 Vol. 1
  • 9
    • 24744442121 scopus 로고    scopus 로고
    • Harrison, J.V.; Enhancing network security by preventing user-initiated malware execution Information Technology: Coding and Computing, 2005. ITCC 2005, International Conference on 2, 4-6 April 2005 Page(s):597-602 2
    • Harrison, J.V.; "Enhancing network security by preventing user-initiated malware execution" Information Technology: Coding and Computing, 2005. ITCC 2005, International Conference on Volume 2, 4-6 April 2005 Page(s):597-602 Vol. 2
  • 10
    • 33745119422 scopus 로고    scopus 로고
    • Autonomous decentralized network security system Networking, Sensing and Control, 2005
    • March Pages
    • Yanhui Guo; Cong Wang; "Autonomous decentralized network security system" Networking, Sensing and Control, 2005. Proceedings, 2005 IEEE, 19-22 March 2005 Page(s):279-282
    • (2005) Proceedings, 2005 IEEE, 19-22 , pp. 279-282
    • Guo, Y.1    Wang, C.2
  • 12
    • 49249138573 scopus 로고    scopus 로고
    • Demystifying network access control
    • white paper
    • Brian Monroe, Security Engineer-STILLSECURE, "Demystifying network access control", white paper 2005, www.stillsecure.com
    • (2005)
    • Monroe, B.1
  • 13
    • 4544314000 scopus 로고    scopus 로고
    • An architecture for dynamic security perimeters of virtual collaborative networks
    • IEEE/IFIP, 19-23 April Pages, 1
    • Djordjevic, I.; Phillips, C.; Dimitrakos, T; "An architecture for dynamic security perimeters of virtual collaborative networks" Network Operations and Management Symposium, 2004. NOMS 2004, IEEE/IFIP, Volume 1, 19-23 April 2004 Page(s):249 - 262 Vol.1
    • (2004) Network Operations and Management Symposium, 2004. NOMS , vol.1 , pp. 249-262
    • Djordjevic, I.1    Phillips, C.2    Dimitrakos, T.3
  • 17
    • 49249106048 scopus 로고    scopus 로고
    • CCNA Intro (self study guide)
    • Wendell Odom, "CCNA Intro (self study guide)", CISCO press; Exam 640-821
    • CISCO press; Exam , pp. 640-821
    • Odom, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.