2021
DOI: 10.3390/s21010306
|View full text |Cite
|
Sign up to set email alerts
|

Assessing the Security of Campus Networks: The Case of Seven Universities

Abstract: The network security situation of campus networks on CERNET (China Education and Research Network) has received great concern. However, most network managers have no complete picture of the network security because of its special management and the rapid growth of network assets. In this investigation, the security of campus networks belonging to seven universities in Wuhan was investigated. A tool called “WebHunt” was designed for campus networks, and with its help, the network security risks were found. Diff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…is paper selects literature [21][22][23][24][25][26][27][28]and literature [29] as the comparison method. e automatic question and answer results are shown in Table 6.…”
Section: Comparison Of Automatic Test Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…is paper selects literature [21][22][23][24][25][26][27][28]and literature [29] as the comparison method. e automatic question and answer results are shown in Table 6.…”
Section: Comparison Of Automatic Test Resultsmentioning
confidence: 99%
“…Its unsupervised idea has reference signi cance, but the e ect of question and answer is relatively limited. Literature [22][23][24]26] and literature [27] are the top ve automatic question and answer methods for the evaluation results of Arts & human cities index tasks, respectively.…”
Section: Comparison Of Automatic Test Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…e asset discovery technology based on cyberspace search engines mainly uses search engines to explore equipment and service information in the entire cyberspace [20,21]. Cyberspace search engines are different from traditional search engines such as Google, Baidu, Bing and other comprehensive information search engines.…”
Section: Discovery Technology Based On Cyberspace Searchmentioning
confidence: 99%
“…KG has a good development prospect in risk identification, assessment, early warning, prevention and control [39]. In terms of information security, KG can be used to assess the security risk of the network and discover potential safety hazards on time [40]. In the field of natural disasters, a typhoon disaster KG is constructed to show the distribution and disaster situation of typhoon disasters, which help people to avoid typhoon disasters [41].…”
Section: Kg and Its Applications In The Risk Fieldmentioning
confidence: 99%