Search

Showing total 7,909 results

Search Constraints

Start Over You searched for: Topic computer network security Remove constraint Topic: computer network security Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
7,909 results

Search Results

1. Special Issue "Emerging AI+X-Based Sensor and Networking Technologies including Selected Papers from ICGHIT 2022–2023".

2. 基于造纸企业信息属性加密的构建与实证研究.

3. Featured Papers on Network Security and Privacy.

5. Enhancing IoT Network Security: Unveiling the Power of Self-Supervised Learning against DDoS Attacks.

6. Quantifying the Security of Composed Systems

7. Secret Writing on Dirty Paper: A Deterministic View.

8. Guest editorial: Information, network and communications security.

9. AN ANALYTICAL APPROACH TO NETWORK WITH IoT SECURITY USING NODEMCU ACCESS POINT-PREVENTION TECHNIQUE.

10. Analysing the Effectiveness of Intrusion Detection Systems against the Mirai Botnet: A Comparative Study.

11. Cybersecurity and Artificial Intelligence Applications: A Bibliometric Analysis Based on Scopus Database.

12. IoT Device Identification Method Based on Causal Inference.

13. Design and implementation of mobile e-commerce application built on WAP mobile payment system.

14. A Systematic Treat Model for Software-Defined Networking.

15. SECURE STORAGE OF COMPUTER NETWORK DATA BASED ON CLOUD COMPUTING.

16. Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.

17. Höchste Zeit für OT-Sicherheit in der Papier industrie: Netzwerk-Segmentierung als Schlüssel zu einer sicheren Betriebstechnik.

18. Social Robot Detection Method with Improved Graph Neural Networks.

19. Security of Medical Internet of Things (MIoT)- A Bibliometric Analysis.

20. How to strongly link data and its medium: the paper case.

21. Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization.

22. Construction and Optimization of Ecological Security Pattern Network Based on the Supply–Demand Ratio of Ecosystem Services: A Study from Chengdu–Chongqing Economic Circle, China.

23. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review.

24. E-Signatures for Paper Reduction and Process Automation.

25. Invited Paper: Challenges in next-generation optical access networks: addressing reach extension and security weaknesses.

26. In-Vehicle Network Intrusion Detection System Using Convolutional Neural Network and Multi-Scale Histograms.

27. A survey for user behavior analysis based on machine learning techniques: current models and applications.

28. Federated learning for energy constrained devices: a systematic mapping study.

29. RECURRENT NEURAL NETWORK BASED INCREMENTAL MODEL FOR INTRUSION DETECTION SYSTEM IN IOT.

30. Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm.

31. SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks.

32. Performance estimation of honeynet system for network security enhancement via copula linguistic.

33. Lightweight log-monitoring-based mitigation tool against WLAN attacks.

34. Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm.

35. Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies.

36. Finding influential nodes in complex networks based on Kullback–Leibler model within the neighborhood.

37. VERIFICATION AND OPTIMIZATION OF NETWORK SECURITY DEFENSE SYSTEM FROM THE PERSPECTIVE OF BLUE ARMY IN ACTUAL OFFENSIVE AND DEFENSIVE EXERCISES.

38. RESEARCH ON NETWORK SECURITY SITUATION AWARENESS TECHNOLOGY BASED ON SECURITY INTELLIGENT MONITORING TECHNOLOGY.

39. A Formal Model for Analyzing Fair Exchange Protocols Based on Event Logic.

40. Design of a Trusted Content Authorization Security Framework for Social Media.

41. A Secure Opportunistic Network with Efficient Routing for Enhanced Efficiency and Sustainability.

42. Strengthening Network Security through Chaotic Maps-Augmented ChaCha20 Encryption: An Extensive Exploration.

43. F3l: an automated and secure function-level low-overhead labeled encrypted traffic dataset construction method for IM in Android.

44. COMPUTER NETWORK VIRUS DEFENSE WITH DATA MINING-BASED ACTIVE PROTECTION.

45. A SURVEY ON NETWORK ADMISSION CONTROL SOLUTION IN 6LOWPAN USING CRYPTOGRAPHIC MECHANISM.

46. XA-GANomaly: An Explainable Adaptive Semi-Supervised Learning Method for Intrusion Detection Using GANomaly.

47. Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform.

48. Modeling and Analysis of Priority-Based Distributed Access Control in Vehicular Networks.

49. A Review Paper on Software Defined Networking.

50. Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks.