Search

Showing total 1,931 results

Search Constraints

Start Over You searched for: Topic computer network security Remove constraint Topic: computer network security Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
1,931 results

Search Results

1. Special Issue "Emerging AI+X-Based Sensor and Networking Technologies including Selected Papers from ICGHIT 2022–2023".

2. 基于造纸企业信息属性加密的构建与实证研究.

3. Featured Papers on Network Security and Privacy.

4. Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks.

5. AN ANALYTICAL APPROACH TO NETWORK WITH IoT SECURITY USING NODEMCU ACCESS POINT-PREVENTION TECHNIQUE.

6. Guest editorial: Information, network and communications security.

7. IoT Device Identification Method Based on Causal Inference.

8. Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database.

9. The Vulnerability Relationship Prediction Research for Network Risk Assessment.

10. Analysing the Effectiveness of Intrusion Detection Systems against the Mirai Botnet: A Comparative Study.

11. Network awareness of security situation information security measurement method based on data mining.

12. SECURE STORAGE OF COMPUTER NETWORK DATA BASED ON CLOUD COMPUTING.

13. HMMED: A Multimodal Model with Separate Head and Payload Processing for Malicious Encrypted Traffic Detection.

14. Höchste Zeit für OT-Sicherheit in der Papier industrie: Netzwerk-Segmentierung als Schlüssel zu einer sicheren Betriebstechnik.

15. Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.

16. Design and implementation of mobile e-commerce application built on WAP mobile payment system.

17. Construction and Optimization of Ecological Security Pattern Network Based on the Supply–Demand Ratio of Ecosystem Services: A Study from Chengdu–Chongqing Economic Circle, China.

18. Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization.

19. Security of Medical Internet of Things (MIoT)- A Bibliometric Analysis.

20. Social Robot Detection Method with Improved Graph Neural Networks.

21. NIDS-FGPA: A federated learning network intrusion detection algorithm based on secure aggregation of gradient similarity models.

22. Adaptive Update Distribution Estimation under Probability Byzantine Attack.

23. Image steganography without embedding by carrier secret information for secure communication in networks.

24. Sterilization of image steganography using self-supervised convolutional neural network.

25. RECURRENT NEURAL NETWORK BASED INCREMENTAL MODEL FOR INTRUSION DETECTION SYSTEM IN IOT.

26. Evaluation Method for Voltage Regulation Range of Medium-Voltage Substations Based on OLTC Pre-Dispatch.

27. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review.

28. A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic.

29. RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY.

30. Federated learning for energy constrained devices: a systematic mapping study.

31. In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms.

32. Modeling and Analysis of Priority-Based Distributed Access Control in Vehicular Networks.

33. Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities.

34. Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm.

35. SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks.

36. Lightweight log-monitoring-based mitigation tool against WLAN attacks.

37. Performance estimation of honeynet system for network security enhancement via copula linguistic.

38. Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm.

39. VERIFICATION AND OPTIMIZATION OF NETWORK SECURITY DEFENSE SYSTEM FROM THE PERSPECTIVE OF BLUE ARMY IN ACTUAL OFFENSIVE AND DEFENSIVE EXERCISES.

40. Finding influential nodes in complex networks based on Kullback–Leibler model within the neighborhood.

41. Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies.

42. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.

43. Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems.

44. Survey of research on confidential computing.

45. SCFS-securing flying ad hoc network using cluster-based trusted fuzzy scheme.

46. The Legal Situation of Operators of Essential Services and Digital Service Providers in the Provisions of the Act of 5 July 2018 on the National Cybersecurity System.

47. Abnormal Traffic Detection for Internet of Things Based on an Improved Residual Network.

48. Design of a Trusted Content Authorization Security Framework for Social Media.

49. Design and implementation of marine information management network security system based on artificial intelligence embedded technology.

50. A review on graph-based approaches for network security monitoring and botnet detection.