A New Threat Evaluation Method Based on Cloud Model

Along with the development of the computer technology and the prevalence of Internet, computer has become more important in the people's life. At the same time, the threat for the mobile network is increasing steadily. Mobile network is just like the sword with two blades. It benefits the scientific researcher, and even the common people, but it makes the threat increase more quickly and more widely. The work to detect and control the Threat Situation of Mobile Network (TSMN) has outspreaded accordingly, and the authors have implemented a system which depicted how to watch and control the threat situation of computer network in detail.

Provided by: Science and Development Network (SciDev.Net) Topic: Security Date Added: Mar 2013 Format: PDF

Find By Topic