Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2556871.2556921acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccConference Proceedingsconference-collections
research-article

Applied Research on Security of Computer Network Technology

Published: 01 December 2013 Publication History

Abstract

With the popularity of the Internet, network security has been paid more and more attention. Application of network security has become important contents for lots of experts and scholars to study. This work began with the concept and features of computer network technology. Then it analyzed the threats of the computer network, including system vulnerabilities, viruses and Trojans, transport protocol, etc. Finally, it studied security measures including installing patch timely, installing anti-virus software and firewalls, developing new transport protocols, etc. It is hoped that it can provide a reference for the actual security work.

References

[1]
Li Linlin. Analysis on Consciousness of Network Security Problems in Universities, Academic Journal of Liaoning Radio and TV University, 2009 (02): 35-36.
[2]
Xu Xing. Vulnerability and Security of Computer Network, Journal of Jiangxi Vocational and Technical College of Electricity, 2007 (4): 47-48.
[3]
Luo Yun, Chen Shuyu. Research on Network Security Interaction System, Journal of Xihua University (Natural Science Edition), 2007 (01): 82-83.

Index Terms

  1. Applied Research on Security of Computer Network Technology

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICCC '13: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
      December 2013
      285 pages
      ISBN:9781450321198
      DOI:10.1145/2556871
      • General Chairs:
      • Min Wu,
      • Wei Lee,
      • Program Chairs:
      • Yiyi Zhouzhou,
      • Riza Esa,
      • Xiang Lee
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • ACM Wuhan Chapter: ACM Wuhan Chapter

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 December 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Application
      2. Computer
      3. Network Technology
      4. Research
      5. Security

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICCC '13

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 230
        Total Downloads
      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 14 Dec 2024

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media