Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Network operating systems
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
A novel real‐time aggregation method on network security events
Available to Purchase
Journal:
Kybernetes
Kybernetes (2011) 40 (5-6): 912–920.
Published: 14 June 2011
... Correlation analysis Network operating systems Data security Process management With growing size and applications of network, great varieties of invasion appear. More and more security equipments were deployed in the enterprise of network. However, network security managers are confronted...
Journal Articles
Algorithm model research of the logical cutting tree on the network maximum flow
Available to Purchase
Journal:
Kybernetes
Kybernetes (2004) 33 (2): 255–262.
Published: 01 February 2004
... of the fault tree method and cutting set theories of the graphics. Therefore, the problem is resolved well and its calculation process is simpler and its logic is better than the original algorithm method. © Emerald Group Publishing Limited 2004 Cybernetics Network operating systems Flow...
