Network security design and its realization in CIMS project

被引:0
|
作者
Jiang, M.
Wang, B.Y.
Chen, W.
Jiang, D.Z.
Ding, Q.L.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [42] Design and Realization of Security Model of E-Commerce System
    Zhu, Gengming
    Liao, Junguo
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 850 - 854
  • [43] Design and realization of security guarantee system of E-Government
    Yang, Qi-Feng
    Tao, Mei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12513 - 12517
  • [45] Automatic Landing Control System Design Using Adaptive Neural Network and Its Hardware Realization
    Juang, Jih-Gau
    Chien, Li-Hsiang
    Lin, Felix
    IEEE SYSTEMS JOURNAL, 2011, 5 (02): : 266 - 277
  • [46] Design and realization of vacuum control and interlock system for SESRI project
    Zhang Jianchuan
    Min Yue
    Li Lili
    Ma Tao
    Zhou Detai
    Yin Jia
    Wang Yanyu
    RADIATION DETECTION TECHNOLOGY AND METHODS, 2022, 6 (04) : 502 - 507
  • [47] Campus network security analysis and design of security system
    Ji, Song
    Pang, Ling
    Xia, WenYing
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1064 - 1067
  • [48] Collaborative design aspects in the European Global Product Realization project
    Bufardi, A
    Xirouchakis, P
    Duhovnik, J
    Horváth, I
    INTERNATIONAL JOURNAL OF ENGINEERING EDUCATION, 2005, 21 (05) : 950 - 963
  • [49] Design and realization of vacuum control and interlock system for SESRI project
    Zhang Jianchuan
    Min Yue
    Li Lili
    Ma Tao
    Zhou Detai
    Yin Jia
    Wang Yanyu
    Radiation Detection Technology and Methods, 2022, 6 : 502 - 507
  • [50] Cyber Assist Project and its security requirement
    Nakashima, H
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 2 - 5