Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,861,058 papers from all fields of science
Search
Sign In
Create Free Account
Network security policy
Known as:
Computer network security
, NSP
A network security policy, or NSP, is a generic document that outlines rules for computer network access, determines how policies are enforced and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Browser security
Computer security
Deep packet inspection
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
An Intrusion Detection System for Network Security Based on an Advanced Honeypots Server
K. Veena
,
K. Meena
International journal of simulation. Systems…
2018
Corpus ID: 68206713
The current greatest challenge to Network security is cyber warfare. Every part of computer network security is an essential…
Expand
2012
2012
An Approach to Evaluating the Computer Network Security with Uncertain Linguistic Information
Jian Wu
2012
Corpus ID: 61600971
2009
2009
Functional requirements of situational awareness in computer network security
Cyril Onwubiko
IEEE International Conference on Intelligence and…
2009
Corpus ID: 7145458
The underpinning of situational awareness in computer networks is to identify adversaries, estimate impact of attacks, evaluate…
Expand
2008
2008
An MOF2-based Services Metamodel
Harshavardhan Jegadeesan
,
S. Balasubramaniam
Journal of Object Technology
2008
Corpus ID: 46500878
As Service-Oriented Computing is gaining mainstream adoption, Services are emerging as core-building blocks of today’s…
Expand
2007
2007
Computer Network Security and Defense Technology
Han Jia-xin
2007
Corpus ID: 63237646
With the proliferation of computers and network technology is developing rapidly,Computer network security is worsening.The…
Expand
2006
2006
A Network Security Policy Model and Its Realization Mechanism
Chenghua Tang
,
Shuping Yao
,
Zhongjie Cui
,
Limin Mao
Conference on Information Security and Cryptology
2006
Corpus ID: 24341794
The large-scale network environment incarnates interconnection of different security domains. There are different security…
Expand
2004
2004
Predicting the intrusion intentions by observing system call sequences
Li Feng
,
X. Guan
,
Sangang Guo
,
Yan-jun Gao
,
Peini Liu
Computers & security
2004
Corpus ID: 10980954
1998
1998
Specification and Validation of a Network Security Policy Model
P. Lindsay
Proof in VDM
1998
Corpus ID: 166273087
This case study concerns the specification and validation of a Security Policy Model (SPM) for an electronic network. The network…
Expand
1995
1995
Practical Computer Network Security
M. Hendry
1995
Corpus ID: 106547618
From the Publisher: This practical guide to network security shows how many threats can be countered with good procedures…
Expand
1986
1986
Considerations for security in the OSI architecture
D. Branstad
IEEE Network
1986
Corpus ID: 752678
The Open Systems Interconnection (OSI) computer network architecture has given computer network security designers a foundation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required