PANT 发表于 2025-3-27 00:18:15
http://reply.papertrans.cn/47/4655/465434/465434_31.pngindifferent 发表于 2025-3-27 01:19:29
http://reply.papertrans.cn/47/4655/465434/465434_32.pngCommodious 发表于 2025-3-27 06:52:37
http://reply.papertrans.cn/47/4655/465434/465434_33.png纪念 发表于 2025-3-27 11:34:09
http://reply.papertrans.cn/47/4655/465434/465434_34.png傀儡 发表于 2025-3-27 17:12:28
https://doi.org/10.1007/978-0-387-35515-3Audit; Auditor; Denial of Service; E-Commerce; IT security; Mapping; algorithms; communication; computer sciFLAIL 发表于 2025-3-27 19:32:16
978-1-4757-5479-7IFIP International Federation for Information Processing 2000crescendo 发表于 2025-3-28 01:05:48
Information Security for Global Information Infrastructures978-0-387-35515-3Series ISSN 1868-4238 Series E-ISSN 1868-422X积习已深 发表于 2025-3-28 02:24:37
The Defense Framework For Large-scale Computer Network Systemention subsystem, intrusive detect subsystem, response subsystem, anti-attack subsystem. These subsystems co-work with each other to provide defense services.The new idea of the DFLCNS is active and cooperative comparing with others. Finally, the paper illustrates the prototype of the DFLCNS and conclude with future works.团结 发表于 2025-3-28 08:04:12
http://reply.papertrans.cn/47/4655/465434/465434_39.pngengrave 发表于 2025-3-28 12:07:07
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/i/image/465434.jpg