Search

Your search keyword '"Logical security"' showing total 843 results

Search Constraints

Start Over You searched for: Descriptor "Logical security" Remove constraint Descriptor: "Logical security" Topic security service Remove constraint Topic: security service
843 results on '"Logical security"'

Search Results

1. Visualization of security event logs across multiple networks and its application to a CSOC

2. Opensec: Policy Based Security using Internal Software Defined Network

3. Enhancing Security of Software Defined Mobile Networks

4. Audit expert system of communication security assessment

5. Content-based security and protected core networking with software-defined networks

6. HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms

7. Cognitive security: securing the burgeoning landscape of mobile networks

8. Matchmaking semantic security policies in heterogeneous clouds

9. SDSA: A framework of a software-defined security architecture

10. Performance and security enhanced authentication and key agreement protocol for SAE/LTE network

11. Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation

13. Providing customized security based on network function composition and reconfiguration

14. A novel security architecture of electronic vehicle system for smart grid communication

15. Lesson Learned: Security is Inevitable

16. Mobile-Based DoS Attack Security Agent in Sensor Networking

17. A First Step Toward Network Security Virtualization: From Concept To Prototype

18. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

19. A Survey of Securing Networks Using Software Defined Networking

20. Security of Software Defined Networks: A survey

21. New Proof Methods for Improving Privacy and Security by using Abe

22. A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth

23. A Study on Security Attribute Design in Security Plan of The Design Phase

24. A novel secure architecture of the virtualized server system

25. Security Techniques in Distributed Systems

26. Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks

27. Study of the Security Enhancements in Various E-Mail Systems

28. An Integrated Electricity Information Security Monitoring Platform

29. AC-PROT: An Access Control Model to Improve Software-Defined Networking Security

30. Personal computer security system

31. Design process for usable security and authentication using a user-centered approach

32. Transaction-based security for smart grids

33. Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra

34. A multi-factors security key generation mechanism for IoT

35. Automated verification of security chains in software-defined networks with synaptic

36. A framework for security on demand

37. Dynamic adaptation and reconfiguration of security in mobile devices

38. A Hierarchical Architecture for Distributed Security Control of Large Scale Systems

39. Security requirements modelling for virtualized 5G small cell networks

40. A Game of Things

41. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks

42. New access control policies for private network and protocol security

43. Security auditing in the fog

44. Design of Network Security Distributed Pre-Warning System

45. Research and realization of info-net security controlling system

46. Survey on security in Internet of Things: State of the art and challenges

47. How Does Computer Security Work?

48. Physical Security Essentials

49. Automatically Enforcing Security SLAs in the Cloud

50. Toward Securing Cyber-Physical Systems Using Exact Cover Set

Catalog

Books, media, physical & digital resources