Proceedings of the 2015 6th International Conference on Manufacturing Science and Engineering 2015
DOI: 10.2991/icmse-15.2015.51
|View full text |Cite
|
Sign up to set email alerts
|

A Brief Analysis of the Key Technologies of Power Enterprise Network Perimeter Information Interactive Security Audit

Abstract: According to the structures of internal and external information networks of power enterprises and the characteristics of enterprise network perimeter information interactions, the paper designs a security audit model and a security assessment framework based on state graph perception, proposes related technologies of perimeter massive log analysis and deep mining, and gives a specific research direction and research methods, thus providing guidance for the construction of a network perimeter information inter… Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles