Search

Your search keyword '"Network Security"' showing total 27,170 results

Search Constraints

Start Over You searched for: Descriptor "Network Security" Remove constraint Descriptor: "Network Security"
27,170 results on '"Network Security"'

Search Results

1. Design of Secure IoMT Networks Using a Federated Learning Approach

3. SNIPER: Detect Complex Attacks Accurately from Traffic

6. Application of Network Security Technology in the Operation Information System of Digital Economy

7. Blockchain-Based Anomaly Detection and Intrusion Prevention in IoT Networks

9. Classify Me Correctly if You Can: Evaluating Adversarial Machine Learning Threats in NIDS

10. Intrusion Tolerance as a Two-Level Game

11. Application of Crawler Algorithm for Situational Awareness in Network Security

13. Importance of Machine Learning and Network Security for Communication Systems

14. Building an intrusion detection system on UNSW‐NB15: Reducing the margin of error to deal with data overlap and imbalance.

15. An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks.

16. Enhancing network security with hybrid feedback systems in chaotic optical communication.

17. Explainable AI-based innovative hybrid ensemble model for intrusion detection.

18. Semi-Supervised Encrypted Malicious Traffic Detection Based on Multimodal Traffic Characteristics.

19. 基于字段感知的文本协议灰盒模糊测试方法.

20. Machine Learning Using Autoencoder Method: An Application to Detecting Anomalies in Internet Traffic.

21. A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment.

22. 多通道10G 网络安全设备的设计与实现.

23. Adaptive Update Distribution Estimation under Probability Byzantine Attack.

24. Harnessing DBSCAN and auto-encoder for hyper intrusion detection in cloud computing.

25. Optimizing intrusion detection in 5G networks using dimensionality reduction techniques.

26. VAE-WACGAN: An Improved Data Augmentation Method Based on VAEGAN for Intrusion Detection.

27. Anti-jamming for cognitive radio networks with Stackelberg game-assisted DSSS approach.

28. VGGIncepNet: Enhancing Network Intrusion Detection and Network Security through Non-Image-to-Image Conversion and Deep Learning.

29. Research on Multi-Layer Defense against DDoS Attacks in Intelligent Distribution Networks.

30. DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates.

31. Optimizing Network Security with Machine Learning and Multi-Factor Authentication for Enhanced Intrusion Detection.

32. BLSAE-SNIDS: A Bi-LSTM Sparse Autoencoder Framework for Satellite Network Intrusion Detection.

33. A Survey of Bug Bounty Programs in Strengthening Cybersecurity and Privacy in the Blockchain Industry.

34. A Network Device Identification Method Based on Packet Temporal Features and Machine Learning.

35. Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System.

36. Research on intent-driven resilience network security.

37. Increasing the Security of Network Data Transmission with a Configurable Hardware Firewall Based on Field Programmable Gate Arrays.

38. Enhancing network security with hybrid feedback systems in chaotic optical communication

39. Explainable AI-based innovative hybrid ensemble model for intrusion detection

40. Enhanced anomaly detection in network security: a comprehensive ensemble approach

41. Anti-jamming for cognitive radio networks with Stackelberg game-assisted DSSS approach

42. Rivest-Shamir-Adleman Algorithm Optimized to Protect IoT Devices from Specific Attacks

43. Exploiting TTPs to Design an Extensible and Explainable Malware Detection System

44. Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective

45. E-GRACL: an IoT intrusion detection system based on graph neural networks.

46. Deep learning based network intrusion detection system: a systematic literature review and future scopes.

47. Anomaly detection system based on deep learning for cyber physical systems on sensory and network datasets.

48. The impact of blockchain and artificial intelligence technologies in network security for e-voting.

49. Game theory in network security for digital twins in industry

50. Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey

Catalog

Books, media, physical & digital resources