Search

Your search keyword '"*FIREWALLS (Computer security)"' showing total 4,316 results

Search Constraints

Start Over You searched for: Descriptor "*FIREWALLS (Computer security)" Remove constraint Descriptor: "*FIREWALLS (Computer security)"
4,316 results on '"*FIREWALLS (Computer security)"'

Search Results

2. Traditional firewall vs. next-generation firewall: A review.

3. YEAR IN REVIEW.

4. Is it time to upgrade your business Wi-Fi?

5. Enhancing Firewall Packet Classification through Artificial Neural Networks and Synthetic Minority Over-Sampling Technique: An Innovative Approach with Evaluative Comparison.

6. Automating cloud virtual machines allocation via machine learning.

7. AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network.

8. Cybersecurity: Safeguarding the digital landscape.

9. Exploring the role of firewall technology in securing computer networks in the 5G environment.

10. Endpoint protection 2024.

11. Network Security Devices Are The Front Door To An IT Environment, But Are They Under Lock And Key?

12. Deep Reinforcement Learning Approach for Cyberattack Detection.

13. Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection †.

14. Toward a modern secure network based on next-generation firewalls: recommendations and best practices.

15. StegEraser: Defending cybersecurity against malicious covert communications.

16. A Hierarchical Security Event Correlation Model for Real-Time Threat Detection and Response.

17. From Zero to 100: Demystifying zero trust and its implications on enterprise people, process, and technology.

18. CISCO'S ROBBINS: Moving Fast To Win The AI Battle: Cisco CEO Chuck Robbins says the company is seizing the AI high ground with a big data AI-enabled security and observability advantage that rivals can't match.

19. The Cost of Inaction: Exploring the Consequences of Ignoring IIoT Security Risks.

20. TOMMANO—Virtualised Network Functions Management in Cloud Environment based on the TOSCA Standard.

21. A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification.

22. Discussion on Application of Virtual Firewall Technology to Network Security in Railway Communication Network Management.

23. Data Analysis of Network Parameters for Secure Implementations of SDN-Based Firewall.

24. Management of information processes of the organization using secure remote access to workplaces.

25. Think like a hacker.

26. Anomaly detection of policies in distributed firewalls using data log analysis.

27. Cloud Security with Lightweight ABE on Mobile IoT Devices.

28. Data-Driven Network Analysis for Anomaly Traffic Detection.

29. Improving computer network security evaluation with grey relational analysis and probabilistic simplified neutrosophic sets.

30. Optimal Control Strategy for SLBRS with Two Control Inputs.

31. Application of artificial intelligence and machine learning in a security operations center.

32. An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets.

33. Deep Learning-Based Bloom Filter for Efficient Multi-key Membership Testing.

34. Survey on various DDoS attacks on firewall and study on emerging DoF attacks.

35. NETBLK: Network Adblocker using Raspberry Pi.

36. How Secure Are You? Australia & India will contribute about 25% each to the region's cybersecurity spending this year.

37. Are you ready for the AI PC? How can you best leverage AI PCs & smartphones? Here are my dozen tips in alphabetical order.

38. OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data.

39. Phase-locking-free all-optical binary sequence flexible matching system.

40. Design of Computer Network Security Intrusion Prevention Strategy and Evaluation Algorithm Analysis Technology.

41. Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls.

42. Analysis of ICS and SCADA Systems Attacks Using Honeypots.

43. 보안 DNS의 데이터를 이용한 동적 감염 클라이언트 격리 기법.

44. NEVER PAY FOR PC REPAIRS.

45. Gates provide various safety features.

46. Windows-Datenschutz perfekt einstellen.

47. Alles gratis ausprobieren.

48. A Review of Cyber Security Threats Against RE Infrastructure and Mitigation Approaches.

49. Evaluation of ensemble method for multiclass classification on unbalanced data.

50. Role of KDD in quality of experience driven detection in wireless network.

Catalog

Books, media, physical & digital resources