A theoretical study of hardware architecture for network security server
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, J.-Y. | - |
dc.contributor.author | Oh, I.-T. | - |
dc.contributor.author | Lee, N.-Y. | - |
dc.contributor.author | Park, J.-H. | - |
dc.date.available | 2018-05-09T01:45:35Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2017-01 | - |
dc.identifier.issn | 1876-1100 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/7223 | - |
dc.description.abstract | Development of IT led to changes in the Infra architecture and the area of information security has been especially emphasized. With the rapidly growing Data, the area of Information Security has established itself as an essential, and the Network Security Field is expected to be developed and elaborated also for the private and public peace and the establishment of social order. The purpose of this study is to consider the architecture of high-performance hardware architecture that can process large amounts of Data, and also to study the architecture of the hardware with flexible architecture in accordance with the amount of network traffic. © Springer Nature Singapore Pte Ltd. 2017. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.relation.isPartOf | Lecture Notes in Electrical Engineering | - |
dc.subject | Computer hardware | - |
dc.subject | Hardware | - |
dc.subject | Hardware security | - |
dc.subject | Network architecture | - |
dc.subject | Networks (circuits) | - |
dc.subject | Security of data | - |
dc.subject | Ubiquitous computing | - |
dc.subject | Flexible architectures | - |
dc.subject | Hardware architecture | - |
dc.subject | High-performance hardware | - |
dc.subject | Large amounts of data | - |
dc.subject | Network traffic | - |
dc.subject | Security server | - |
dc.subject | Social order | - |
dc.subject | Theoretical study | - |
dc.subject | Network security | - |
dc.title | A theoretical study of hardware architecture for network security server | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/978-981-10-3023-9_81 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Lecture Notes in Electrical Engineering, v.421, pp.525 - 530 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-85007409239 | - |
dc.citation.endPage | 530 | - |
dc.citation.startPage | 525 | - |
dc.citation.title | Lecture Notes in Electrical Engineering | - |
dc.citation.volume | 421 | - |
dc.contributor.affiliatedAuthor | Lee, N.-Y. | - |
dc.contributor.affiliatedAuthor | Park, J.-H. | - |
dc.type.docType | Book Chapter | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Hardware architecture | - |
dc.subject.keywordAuthor | Information security | - |
dc.subject.keywordAuthor | Network | - |
dc.subject.keywordAuthor | Security server | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.