Search

Showing total 63 results

Search Constraints

Start Over You searched for: Topic network security Remove constraint Topic: network security Publication Type Books Remove constraint Publication Type: Books Publication Type Conference Materials Remove constraint Publication Type: Conference Materials Publisher springer nature Remove constraint Publisher: springer nature
63 results

Search Results

1. Security in Computer and Information Sciences. Second International Symposium, EuroCybersec 2021, Nice, France, October 25-26, 2021, Revised Selected Papers.

2. Attack Patterns Discovery by Frequent Episodes Mining from Honeypot Systems.

3. A Survey on Detection Techniques to Prevent Cross-Site Scripting Attacks on Current Web Applications.

4. Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques.

5. Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.

6. A Self-Organized Multiagent System for Intrusion Detection.

7. Detection and Defense of Identity Attacks in P2P Network.

8. Storage-Based Intrusion Detection Using Artificial Immune Technique.

9. Application of Data Mining to Network Intrusion Detection: Classifier Selection Model.

10. Non-stationary Data Mining: The Network Security Issue.

11. Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic.

12. Digital Health Transformation, Smart Ageing, and Managing Disability

13. TRIDNT: Isolating Dropper Nodes with Some Degree of Selfishness in MANET.

14. Framework Design and Performance Analysis on Pairwise Key Establishment.

15. Queueing Analysis for Networks Under DoS Attack.

16. Peeking Through the Cloud: DNS-Based Estimation and Its Applications.

17. A Graph-Theoretic Visualization Approach to Network Risk Analysis.

18. Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.

19. Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.

20. Gnort: High Performance Network Intrusion Detection Using Graphics Processors.

21. Distinguishing between FE and DDoS Using Randomness Check.

22. Efficient User Authentication and Key Agreement in Wireless Sensor Networks.

23. Network Monitoring for Security and Forensics.

24. An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks.

25. A Multi-agent Cooperative Model and System for Integrated Security Monitoring.

26. Freshness assurance of authentication protocols.

27. Cyber Security

28. Security in Computer and Information Sciences

29. Cyber Security

30. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis.

31. A Low-Rate DoS Detection Based on Rate Anomalies.

32. The Evaluation Model of Network Security Based on Fuzzy Rough Sets.

33. On the Design of SOHO Networks.

34. Anonymity Leakage Reduction in Network Latency.

35. Wireless Network Security Vulnerabilities and Concerns.

36. State of the Art of Network Security Perspectives in Cloud Computing.

37. Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks.

38. In-depth Evaluation of Content-Based Phishing Detection to Clarify Its Strengths and Limitations.

39. Availability Analysis of an IMS-Based VoIP Network System.

40. An Automated Worm Containment Scheme.

41. Secure Distribution of the Device Identity in Mobile Access Network.

42. A New Distributed Intrusion Detection Method Based on Immune Mobile Agent.

43. Safe and Efficient Strategies for Updating Firewall Policies.

44. A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU.

45. Hardening Botnet by a Rational Botmaster.

46. Formal Verification of Security Policy Implementations in Enterprise Networks.

47. A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability.

48. Network Attack Detection Based on Peer-to-Peer Clustering of SNMP Data.

49. A Scalable, Vulnerability Modeling and Correlating Method for Network Security.

50. Honeybee-Based Model to Detect Intrusion.