Search

Your search keyword '"*FIREWALLS (Computer security)"' showing total 1,848 results

Search Constraints

Start Over You searched for: Descriptor "*FIREWALLS (Computer security)" Remove constraint Descriptor: "*FIREWALLS (Computer security)" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
1,848 results on '"*FIREWALLS (Computer security)"'

Search Results

2. YEAR IN REVIEW.

3. Enhancing Firewall Packet Classification through Artificial Neural Networks and Synthetic Minority Over-Sampling Technique: An Innovative Approach with Evaluative Comparison.

4. Automating cloud virtual machines allocation via machine learning.

5. AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network.

6. Deep Reinforcement Learning Approach for Cyberattack Detection.

7. Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection †.

8. Toward a modern secure network based on next-generation firewalls: recommendations and best practices.

9. A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response.

10. From Zero to 100: Demystifying zero trust and its implications on enterprise people, process, and technology.

11. The Cost of Inaction: Exploring the Consequences of Ignoring IIoT Security Risks.

12. Think like a hacker.

13. Anomaly detection of policies in distributed firewalls using data log analysis.

14. Data-Driven Network Analysis for Anomaly Traffic Detection.

15. Optimal Control Strategy for SLBRS with Two Control Inputs.

16. Application of artificial intelligence and machine learning in a security operations center.

17. An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets.

18. Deep Learning-Based Bloom Filter for Efficient Multi-key Membership Testing.

19. How Secure Are You? Australia & India will contribute about 25% each to the region's cybersecurity spending this year.

20. Are you ready for the AI PC? How can you best leverage AI PCs & smartphones? Here are my dozen tips in alphabetical order.

21. OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data.

22. Design of Computer Network Security Intrusion Prevention Strategy and Evaluation Algorithm Analysis Technology.

23. Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls.

24. Analysis of ICS and SCADA Systems Attacks Using Honeypots.

26. Enhancement of QoS in Internet of Things Wearable Devices Dependent on 5G Technology.

27. Cancer Research Line (CAREL): Development of Expanded Distributed Research Networks for Prostate Cancer and Lung Cancer.

28. FortiGate firewall : practical guidance and hands-on labs

29. Palo Alto firewall : practical guidance and hands-on labs

30. Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks †.

31. A Proposed Multi-Layer Firewall to Improve the Security of Software Defined Networks.

32. A Probabilistic Analysis of Cyber Risks.

33. Abstracting network policies

34. An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks.

35. Performance Evaluation of Stateful Firewall-Enabled SDN with Flow-Based Scheduling for Distributed Controllers.

36. A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks.

37. Study and development of an autopsy module for automated analysis of image metadata

38. Using a Combined Fuzzy-AHP and TOPSIS Decision Model for Selecting the Best Firewall Alternative.

39. An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications: Applications, Challenges, and Solutions.

40. Empirical Study of Adaptive Serious Games in Enhancing Learning Outcome.

41. PureDome VPN.

42. Bitdefender Total Security: Good protection, extras could be better.

43. Many‐field packet classification with decomposition and reinforcement learning.

44. Validation pipeline for machine learning algorithm assessment for multiple vendors.

45. Effectiveness Evaluation of Different IDSs Using Integrated Fuzzy MCDM Model.

46. NFV-COIN: Unleashing The Power of In-Network Computing with Virtualization Technologies.

47. INDIA ON TRACK TO BECOME DIGITAL-FIRST ECONOMY.

48. BACnet Secure Connect Offers Next-Level BAS Cybersecurity.

49. Strengthening Cybersecurity The Right Way.

50. IEE im Gespräch mit Christian Fiebach, Geschäftsführer ipf electronic.

Catalog

Books, media, physical & digital resources