透過您的圖書館登入
IP:3.128.190.205

並列摘要


Sensitive information faces critical risks when it is trans- mitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiality, integrity, and availability. The rapid development in network technologies has only helped increase network attacks and hide their malicious intent. This paper analyzes attack types and classifies them according to their intent. A causal network approach is used to recognize attackers' plans and predict their intentions. Attack intention is the ultimate attack goal which the attacker attempts to achieve by executing various methods or techniques, and recognizing it will help security administrators select an appropriate protection system.

被引用紀錄


Qiu, J. W. (2010). 基於標準與特別演繹樣本訊號元素之稀疏訊號處理法於腦電圖中觸發電位與獨立成份訊號之分析 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2010.00187
闕延洲(2004)。自行車內變速系統之可靠度研究〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2004.01373
呂紹澤(2012)。以串聯觀點探討系統不同失效模式之效應〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-1903201314441717

延伸閱讀