Skip to Main Content
Keywords: Network operating systems
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal: Kybernetes
Kybernetes (2011) 40 (5-6): 912–920.
Published: 14 June 2011
... Correlation analysis Network operating systems Data security Process management With growing size and applications of network, great varieties of invasion appear. More and more security equipments were deployed in the enterprise of network. However, network security managers are confronted...
Journal Articles
Journal: Kybernetes
Kybernetes (2004) 33 (2): 255–262.
Published: 01 February 2004
... of the fault tree method and cutting set theories of the graphics. Therefore, the problem is resolved well and its calculation process is simpler and its logic is better than the original algorithm method. © Emerald Group Publishing Limited 2004 Cybernetics Network operating systems Flow...

or Create an Account

Close Modal
Close Modal