共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
5.
Ricardo de O. Schmidt Ramin Sadre Luuk Hendriks 《Journal of Network and Systems Management》2016,24(3):746-753
This is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level traffic measurements for network management. 相似文献
6.
7.
Kazuhiko Kinoshita Makoto Takano Young-Woo Lee Sanwei Sun Toshio Tonouchi Yoonhee Kim Teh-Sheng Huang 《Journal of Network and Systems Management》2014,22(3):509-516
This paper presents a report on APNOMS 2013, which was held September 25–27, 2013 in the International Conference Center, Hiroshima, Japan. The theme of APNOMS 2013 was “Integrated Management of Network Virtualization”. 相似文献
8.
James Won-Ki Hong Luoming Meng Young-Tak Kim Hiroshi Uno Shingo Ata Yan Ma Deokjai Choi 《Journal of Network and Systems Management》2009,17(1-2):91-98
This article presents a report on APNOMS 2008, which was held October 22–24, 2008 in Beijing, China. The theme of APNOMS 2008 was “Challenges for Next Generation Network Operations and Service Management.” 相似文献
9.
Philippe Owezarski Jorge Lobo Deep Medhi 《Journal of Network and Systems Management》2013,21(4):707-712
This short paper reports on the CNSM’2012 conference (International Conference on Network and Service Management). It presents an overview on the technical sessions, keynotes, tutorials, and panel, especially focusing on the original and dominating topics that raised the most comments and discussion. It then aims at indicating what the dominant research directions were in the network and service management community. 相似文献
10.
11.
付岩 《计算机光盘软件与应用》2011,(21)
随着时代的不断发展,生产力的不断进步,科学技术的发展也越来越迅速。计算机已经普遍进入千家万户,但是随之而来的种种问题严重扰乱了计算机网络系统的安全,各种黑客攻击、网络诈骗等扰乱社会公共秩序的问题市场发生。如何对计算机网络进行有效的安全管理是当前的一大难题。本文试图从实际情况出发,找出一些应对办法,对维护网络系统安全做出一定的贡献。 相似文献
12.
随着网络攻击者知识的成熟以及攻击工具与手法的复杂多样,网络安全问题也日益突出起来,单纯的防火墙策略已无法满足网络安全的需要。为了更进一步提高网络安全,必须采用防火墙与入侵检测系统相结合的网络安全技术。另一方面,校园网网络服务平台一般是基于开放源代码软件的,故文中提出了采用Linux系统下IPtables包过滤+Squid&Socks代理服务器的防火墙体系和网络入侵检测系统Snort相结合的网络安全策略来增强校园网的安全,并详细地阐述了在校园网环境下如何实现该策略以及相关的关键技术。 相似文献
13.
随着网络攻击者知识的成熟以及攻击工具与手法的复杂多样,网络安全问题也日益突出起来,单纯的防火墙策略已无法满足网络安全的需要.为了更进一步提高网络安全,必须采用防火墙与入侵检测系统相结合的网络安全技术.另一方面,校园网网络服务平台一般是基于开放源代码软件的,故文中提出了采用Linux系统下IPtables包过滤+Squid&Socks代理服务器的防火墙体系和网络入侵检测系统Snort相结合的网络安全策略来增强校园网的安全,并详细地阐述了在校园网环境下如何实现该策略以及相关的关键技术. 相似文献
14.
15.
Layne C. Bradley 《Information Systems Management》1985,2(1):21-28
Planning and implementing a data communications network is a complex task involving organizational as well as technical issues. The network design process must be integrated with the organization's business goals and strategies. Because network planning, implementation, and maintenance require skills not usually found in a batch-oriented DP environment, training is critical. 相似文献
16.
文中针对一种特殊环境下的异构网络,研究其环境下的通信过程中所呈现的传输特征。利用在网络监测过程中得到性能参数的统计信息对网络传输性能进行分析,并对网络性能管理中性能参数的变化规律进行讨论,论述了统计分析基本原理在性能评估中的应用。提出了在测量和分析过程中需要考虑的因素以及进行分析的方法,为管理人员直观了解网络运行状况提供了依据。 相似文献
17.
张剑 《计算机技术与发展》2004,14(5)
文中针对一种特殊环境下的异构网络,研究其环境下的通信过程中所呈现的传输特征.利用在网络监测过程中得到性能参数的统计信息对网络传输性能进行分析,并对网络性能管理中性能参数的变化规律进行讨论,论述了统计分析基本原理在性能评估中的应用.提出了在测量和分析过程中需要考虑的因素以及进行分析的方法,为管理人员直观了解网络运行状况提供了依据. 相似文献
18.
19.
Guisseppi A. Forgionne 《Information Systems Management》1988,5(1):42-51
There have been many recent proposals to improve the manner in which computer technology is made available to management. These proposals, however, do not completely consider the nature of manage-ment technology, nor do they fully recognize the role of technology in the decisionmaking process. This article addresses these issues and presents an information systems strategy for effectively dealing with the technology of management. 相似文献
20.
电子商务蓬勃发展,但其网络安全问题日益突出。因此必须了解电子商务所受到的网络威胁,并采取相应的安全策略来保证电子商务系统的正常、连续、稳定、正确地运行。 相似文献