메뉴 건너뛰기




Volumn 2, Issue 1, 2014, Pages 325-334

Network security – An updated perspective

Author keywords

Cyber attacks; Data breaches; Intrusions; Network security; Security intelligence; Security threats

Indexed keywords

SECURITY SYSTEMS;

EID: 84902172373     PISSN: None     EISSN: 21642583     Source Type: Journal    
DOI: 10.1080/21642583.2014.895969     Document Type: Article
Times cited : (15)

References (23)
  • 1
    • 85028299305 scopus 로고    scopus 로고
    • Cert/cc statistics
    • Cert (2012). Cert/cc statistics. http://www.cert.org/stats/
    • (2012)
  • 3
    • 84865247943 scopus 로고    scopus 로고
    • Seeking help: The important role of ethical hackers
    • Conrad, J. (2012). Seeking help: The important role of ethical hackers. Network Security, 8, 5–8.
    • (2012) Network Security , vol.8 , pp. 5-8
    • Conrad, J.1
  • 4
    • 84862028033 scopus 로고    scopus 로고
    • Why multi-layered security is still the best defence
    • Denman, S. (2012). Why multi-layered security is still the best defence. Network Security, 3, 5–7.
    • (2012) Network Security , vol.3 , pp. 5-7
    • Denman, S.1
  • 6
    • 84887913727 scopus 로고    scopus 로고
    • Living with cybercrime
    • Hilbert, E. (2013). Living with cybercrime. Network Security, 11, 15–17.
    • (2013) Network Security , vol.11 , pp. 15-17
    • Hilbert, E.1
  • 9
    • 84856248608 scopus 로고    scopus 로고
    • An information theoretic approach for feature selection
    • Kumar, G., & Kumar, K. (2012). An information theoretic approach for feature selection. Security and Communication Networks, 5(2), 178–185. doi:10.1002/sec.303
    • (2012) Security and Communication Networks , vol.5 , Issue.2 , pp. 178-185
    • Kumar, G.1    Kumar, K.2
  • 10
    • 78650169163 scopus 로고    scopus 로고
    • The use of artificial intelligence based techniques for intrusion detection: A review
    • Kumar, G., Kumar, K., & Sachdeva, M. (2010a). The use of artificial intelligence based techniques for intrusion detection: A review. Artificial Intelligence Review 34(4), 369–387.
    • (2010) Artificial Intelligence Review , vol.34 , Issue.4 , pp. 369-387
    • Kumar, G.1    Kumar, K.2    Sachdeva, M.3
  • 11
    • 80052334682 scopus 로고    scopus 로고
    • An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication
    • Kumar, G., Kumar, K., & Sachdeva, M. (2010b). An empirical comparative analysis of feature reduction methods for intrusion detection. International Journal of Information and Telecommunication Technology, 1(1), 44–51.
    • (2010) Technology , vol.1 , Issue.1 , pp. 44-51
    • Kumar, G.1    Kumar, K.2    Sachdeva, M.3
  • 12
    • 85028320589 scopus 로고    scopus 로고
    • PandaLabs (2012). 2012 annual report pandalabs. Retrieved September 23, 2013, form http://press.pandasecurity.com/wp -content/uploads/2013/02/PandaLabs-Annual-Report-2012. pdf.
    • (2012)
  • 13
    • 85028323999 scopus 로고    scopus 로고
    • PandaLabs (2013). Pandalabs quarterly report January – March 2013. Retrieved September 23, 2013, form http://press. pandasecurity.com/wp-content/uploads/2010/05/PandaLabs-Quaterly-Report.pdf
    • (2013)
  • 14
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448–3470. doi:10.1016/j.comnet.2007.02.001
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 15
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the DoS and DDoS problems
    • Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys (CSUR), 39(1), Article 3. doi:10.1145/1216370.1216373
    • (2007) ACM Computing Surveys (CSUR) , vol.39 , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 16
    • 85006579377 scopus 로고    scopus 로고
    • The state of information security
    • Potts, M. (2012). The state of information security. Network Security, 2012(7), 9–11.
    • (2012) Network Security , vol.2012 , Issue.7 , pp. 9-11
    • Potts, M.1
  • 19
    • 84857767605 scopus 로고    scopus 로고
    • The state of network security
    • Schneider, D. (2012). The state of network security. Network Security, 2012(2), 14–20.
    • (2012) Network Security , vol.2012 , Issue.2 , pp. 14-20
    • Schneider, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.