• No results found

network protection

Optimization of network protection against virus spread

Optimization of network protection against virus spread

... of protection in such networks have hardly been ...of network protection for the SIS model at the threshold was considered by Borgs et ...of protection depends on the node degree is a starting ...

8

Network Protection Against DDoS Attacks

Network Protection Against DDoS Attacks

... the network protection against Distributed Denial of Service attacks ...protected network are presented ...protected network or device against DDoS ...

7

Electrical network protection. Sepam series 10. Digital protection relays. Catalogue 2008

Electrical network protection. Sepam series 10. Digital protection relays. Catalogue 2008

... earth-fault protection (ANSI 50N/51N), the zero- sequence input must be connected either to the common point of the three phase CTs or to one earth-fault protection CT or to a CSH120, CSH200 or GO110 core ...

26

Improving Network Protection and Performance with Network-Based Antivirus Technology

Improving Network Protection and Performance with Network-Based Antivirus Technology

... application-level content streams and compare the streams to the patterns in the signature database in real time. The content reassembly and scanning processes must take place at network speed, or the NAV system ...

16

Best Choice for Your Network Protection

Best Choice for Your Network Protection

... ZyWALL USG series build-in report system which offers a comprehensive set of real-time and historical reports, including firewall, virus and intrusion attacks, bandwidth usage, web site usage, and user activity. ...

12

Network Protection Using NetFlow Data

Network Protection Using NetFlow Data

... Bˇ eˇ znˇ e pouˇ z´ıvan´ e statistick´ ych zp˚ usoby detekce jsou zaloˇ zeny na vytvoˇ ren´ı profilu chov´ an´ı jednotliv´ ych poˇ c´ıtaˇ c˚ u v datov´ e s´ıti.. Pouˇ z´ıvaj´ı se zde r˚ [r] ...

30

Network Protection Using NetFlow Data

Network Protection Using NetFlow Data

... Útoků na DNS existuje mnoho, některé jsou detekovatelné pouze s využitím dat z aplikační vrstvy síťového protokolu., některé naopak můžeme objevit pouze díky použití [r] ...

55

Network Protection Advanced storm protection features include bandwidth limiting, policy-based storm protection and packet storm protection.

Network Protection Advanced storm protection features include bandwidth limiting, policy-based storm protection and packet storm protection.

... the network, in order to mitigate threats to network ...to network security policies and either grant access or offer ...the network is only accessed by known users and ...

6

1+N Network Protection for Mesh Networks: Network Coding Based Protection Using p Cycles and Protection Paths

1+N Network Protection for Mesh Networks: Network Coding-Based Protection Using p-Cycles and Protection Paths

... A system, comprising: nodes; p-Cycle; Wherein each of the plurality of bidirectional connections being link disjoint from all other of the bidirectional 40 connections; Wherein the prote[r] ...

21

Application of synchronous compensators in the GB transmission network to address protection challenges from increasing renewable generation

Application of synchronous compensators in the GB transmission network to address protection challenges from increasing renewable generation

... the network, which has the benefit of ensuring that network protection operates correctly in low fault level scenarios and minimising the risk of commutation failure of the West Coast HVDC link ...

6

Control access security: wireless LAN auditing framework

Control access security: wireless LAN auditing framework

... wireless network is one of the important elements in ICT infrastructure since it is famously known for the most vulnerable area of ...security protection for wireless network is one of the crucial ...

14

Resolution on Privacy Protection in Social Network Services

Resolution on Privacy Protection in Social Network Services

... little protection exists at present against copying any kind of personal data from profiles – by other network members, or by unauthorised third parties from outside the network – and using them for ...

5

Privacy Protection over Network Communication          in Manet

Privacy Protection over Network Communication in Manet

... In Black hole attack, the malicious node generates and propagates fabricated routing information and advertises itself as having a valid shortest route to the destined node. If the malicious node replies to the ...

5

Protection of Low Voltage CIGRE Distribution Network

Protection of Low Voltage CIGRE Distribution Network

... The protection of CIGRE in its central part ...a network. The over current protection coordina- tion in the central part of CIGRE network is made by using fuses F15, FA, F14, F10 and F5 as ...

12

Keystone Network Isolator with ESD- and Lightning Protection

Keystone Network Isolator with ESD- and Lightning Protection

... the Network Isolator already provide an effective protection against voltage surges of up to 10,000 ...of protection is ensured, conforming to the stringent requirements of IEC61000-4-2 (ESD; 15kV ...

6

Network Layer Attacks and Protection in MANETA
          Survey

Network Layer Attacks and Protection in MANETA Survey

... The dynamic nature of MANETs makes it more vulnerable to attacks at different layers. One of the MANET layers that are mostly attacked is network layer. In this paper we have done a survey on network layer ...

7

OPTIMIZING COMMUNICATION AND COOLING COSTS IN HPC DATA CENTER

OPTIMIZING COMMUNICATION AND COOLING COSTS IN HPC DATA CENTER

... In real substation automation systems, it is beneficial for the protection and communication engineers to evaluate the message delay inside the network so that the network performance spe[r] ...

13

Messaging Security, Availability, and Control for Small and Mid-sized Businesses

Messaging Security, Availability, and Control for Small and Mid-sized Businesses

... proliferates, protection is extended to the network perimeter, stopping threats at the entry ...the network and reaching downstream servers, such as expensive message stores and data archives, as ...

20

Improvement and Design of Transmitter Modifier Wind Cooling Protection for CINRAD/CB Weather Radar

Improvement and Design of Transmitter Modifier Wind Cooling Protection for CINRAD/CB Weather Radar

... the protection threshold, it was found that when one of the three fans stopped, it could not be ...system protection (Yeo et ...system protection against the above-mentioned defects of the ...

8

Bridging the Gap Between Security Tools and SDN Controllers

Bridging the Gap Between Security Tools and SDN Controllers

... level network applications to dynamically change the flow tables of OpenFlow ...many network relevant applications have been ...improving network infrastructures of data centers through centralized ...

16

Show all 10000 documents...

Related subjects