Study of Application in Network Intrusion Prevention

Article Preview

Abstract:

Network intrusion prevention application are studied, analyzed vibration optical fiber, cable radiation, infrared radiation, tension fences, high-voltage pulse and other key technologies, proposed safe city, government investment, government rent, lease operator platform, operating mode, and applications in key areas of finance, police, parks and other surveillance industry.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1209-1212

Citation:

Online since:

March 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chen Xin ; Li Fengrong ; Xing Tao ; Li Jia , Sleep-Wakeup Mechanism of Belt Sensor Network for Fence Anti-Intrusion, Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, (2011).

DOI: 10.1109/wicom.2011.6040354

Google Scholar

[2] Caiti, A. ; Munafo, A. ; Vettori, G. , HISS: Harbour intrusion simulator system , OCEANS 2009 – EUROPE, 2009, Page(s): 1 – 10.

DOI: 10.1109/oceanse.2009.5278264

Google Scholar

[3] Guan Xin ; Li Yun-jie, An New Intrusion Prevention Attack System Model Based on Immune Principle, e-Business and Information System Security (EBISS), 2010 2nd International Conference on , 2010 , Page(s): 1 – 4.

DOI: 10.1109/ebiss.2010.5473288

Google Scholar

[4] Kavitha, C. ; Suresh, M., Massive stream data processing to attain anomaly Intrusion Prevention, Devices, Circuits and Systems (ICDCS), 2012 International Conference on , 2012 , Page(s): 572 – 575.

DOI: 10.1109/icdcsyst.2012.6188773

Google Scholar

[5] Kavitha, C. ; Suresh, M. , Processing Massive Data Streams to Achieve Anomaly Intrusion Prevention Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on , 2012 , Page(s): 948 – 952.

DOI: 10.1109/cicn.2012.167

Google Scholar