The Study of Network Attrack and Defense Modeling
碩士 === 國防大學中正理工學院 === 資訊科學研究所 === 93 === Nowadays, the security of a computer network system has become a central part of the information warfare (IW), because the computer network is one of the primary ways for sending military commands and control information during the war. A fatal attack to a co...
Main Authors: | Yu Wan Yu, 余琬瑜 |
---|---|
Other Authors: | 陳宗煦 |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09368920708648327449 |
Similar Items
-
Cognitive Authentication and Cooperative Defense Scheme for Wireless Network Environments
by: Chen-Ming Yu, et al.
Published: (2010) -
Implementation of SLA-Based Security Policy Management for Cooperative Defense Network
by: Meng-Ru Yu, et al.
Published: (2010) -
The Relationship Between the Cross-Strait Division Models and Financial Performance of Parent Company-An empirical study of Taiwanese Machinery Industry
by: Wan-Yu Tseng, et al.
Published: (2006) -
The Establishment of Performance Index Model for Defense R&D Project Management
by: Ya-Chiung Yu, et al.
Published: (2003) -
A Study of SLA-based Defense Resource Management Strategy in Network Security Defense System
by: Yu-Siang Wei, et al.
Published: (2011)