Login / Signup
Application of Zero Trust Security Architecture in Power Communication Network Security Management System.
Dongmei Bin
Fuchuan Tang
Yangguang Lin
Chunyan Yang
Ying Ling
Published in:
SPCNC (2023)
Keyphrases
</>
network security
management system
computer networks
security architecture
intrusion detection system
security policies
intrusion detection
database
network traffic
data model
information security