Login / Signup

Application of Zero Trust Security Architecture in Power Communication Network Security Management System.

Dongmei BinFuchuan TangYangguang LinChunyan YangYing Ling
Published in: SPCNC (2023)
Keyphrases
  • network security
  • management system
  • computer networks
  • security architecture
  • intrusion detection system
  • security policies
  • intrusion detection
  • database
  • network traffic
  • data model
  • information security