Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,747,759 papers from all fields of science
Search
Sign In
Create Free Account
Network security policy
Known as:
Computer network security
, NSP
A network security policy, or NSP, is a generic document that outlines rules for computer network access, determines how policies are enforced and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Browser security
Computer security
Deep packet inspection
Encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Application research of Virtual cloud desktop on College computer laboratory management
Shigang Wang
2018
Corpus ID: 54815809
Computer network technology is developing rapidly, the thorough change the way people live, work, and at the same time brings…
Expand
2016
2016
The Security and Protection Strategy Study of Computer Network Information
Junyan Shi
,
Juanjuan Li
2016
Corpus ID: 56465742
With the rapid development of science and technology, computer network technology has spread to all areas of production and life…
Expand
2013
2013
Campus Computer Network Security and Preventive Strategies
Sha Hong-mei
2013
Corpus ID: 112772958
The school's teaching activities can not separate from computer network.The school's computer network security issues are…
Expand
2012
2012
An Approach to Evaluating the Computer Network Security with Uncertain Linguistic Information
Jian Wu
2012
Corpus ID: 61600971
2010
2010
A Pattern Partitioning Algorithm for Memory-Efficient Parallel String Matching in Deep Packet Inspection
H. Kim
,
Hyejeong Hong
,
D. Baek
,
Sungho Kang
IEICE transactions on communications
2010
Corpus ID: 2771389
This paper proposes a pattern partitioning algorithm that maps multiple target patterns onto homogeneous memory-based string…
Expand
2009
2009
Functional requirements of situational awareness in computer network security
Cyril Onwubiko
IEEE International Conference on Intelligence and…
2009
Corpus ID: 7145458
The underpinning of situational awareness in computer networks is to identify adversaries, estimate impact of attacks, evaluate…
Expand
1998
1998
Specification and Validation of a Network Security Policy Model
P. Lindsay
Proof in VDM
1998
Corpus ID: 166273087
This case study concerns the specification and validation of a Security Policy Model (SPM) for an electronic network. The network…
Expand
1997
1997
The doors are locked but the thieves and vandals are still getting in : A proposal in tort to alleviate corporate America's cyber-crime problem
D. L. Gripman
1997
Corpus ID: 147740745
La legislation concernant le prejudice peut dissuader les pirates. Proposition d'une norme minimale pour la securite des reseaux…
Expand
1986
1986
Considerations for security in the OSI architecture
D. Branstad
IEEE Network
1986
Corpus ID: 752678
The Open Systems Interconnection (OSI) computer network architecture has given computer network security designers a foundation…
Expand
1978
1978
The network security center
Frank R. Heinrich
1978
Corpus ID: 33527339
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE