Methodology for Mapping the Ecological Security Pattern and Ecological Network in the Arid Region of Xinjiang, China.
Yishan WangFei ZhangXingyou LiVerner Carl JohnsonMou Leong TanHsiang-Te KungJingchao ShiJupar BahtebayXin HePublished in: Remote. Sens. (2023)
Keyphrases
- network management
- security threats
- cyber attacks
- enterprise network
- security measures
- network model
- communication networks
- security protection
- wireless sensor networks
- complex networks
- network connection
- information security
- hong kong
- denial of service attacks
- security management
- virtual private network
- network resources
- security problems
- security issues
- region of interest
- pattern matching
- network services
- input patterns
- application level
- security mechanisms
- intrusion detection system
- image regions
- input image