Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,355,632 papers from all fields of science
Search
Sign In
Create Free Account
Network security policy
Known as:
Computer network security
, NSP
A network security policy, or NSP, is a generic document that outlines rules for computer network access, determines how policies are enforced and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Browser security
Computer security
Deep packet inspection
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
An empirical test of the accuracy of an attack graph analysis tool
Teodor Sommestad
,
Fredrik Sandström
Information and Computer Security
2015
Corpus ID: 206396351
– The purpose of this paper is to test the practical utility of attack graph analysis. Attack graphs have been proposed as a…
Expand
2014
2014
Network Security Policy Verification
C. Diekmann
Arch. Formal Proofs
2014
Corpus ID: 14854799
We present a unified theory for verifying network security policies. A security policy is represented as directed graph. To check…
Expand
2011
2011
A model for evaluating computer network security systems with 2-tuple linguistic information
Shilin Zhang
Computers and Mathematics with Applications
2011
Corpus ID: 7480913
2010
2010
A Pattern Partitioning Algorithm for Memory-Efficient Parallel String Matching in Deep Packet Inspection
H. Kim
,
Hyejeong Hong
,
D. Baek
,
Sungho Kang
IEICE transactions on communications
2010
Corpus ID: 2771389
This paper proposes a pattern partitioning algorithm that maps multiple target patterns onto homogeneous memory-based string…
Expand
2009
2009
Functional requirements of situational awareness in computer network security
Cyril Onwubiko
IEEE International Conference on Intelligence and…
2009
Corpus ID: 7145458
The underpinning of situational awareness in computer networks is to identify adversaries, estimate impact of attacks, evaluate…
Expand
2008
2008
An MOF2-based Services Metamodel
Harshavardhan Jegadeesan
,
S. Balasubramaniam
Journal of Object Technology
2008
Corpus ID: 46500878
As Service-Oriented Computing is gaining mainstream adoption, Services are emerging as core-building blocks of today’s…
Expand
2007
2007
Computer Network Security and Defense Technology
Han Jia-xin
2007
Corpus ID: 63237646
With the proliferation of computers and network technology is developing rapidly,Computer network security is worsening.The…
Expand
2004
2004
Predicting the intrusion intentions by observing system call sequences
Li Feng
,
X. Guan
,
Sangang Guo
,
Yan-jun Gao
,
Peini Liu
Computers & security
2004
Corpus ID: 10980954
1995
1995
Practical Computer Network Security
M. Hendry
1995
Corpus ID: 106547618
From the Publisher: This practical guide to network security shows how many threats can be countered with good procedures…
Expand
1986
1986
Considerations for security in the OSI architecture
D. Branstad
IEEE Network
1986
Corpus ID: 752678
The Open Systems Interconnection (OSI) computer network architecture has given computer network security designers a foundation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE