Search

Your search keyword '"network security"' showing total 886 results

Search Constraints

Start Over You searched for: Descriptor "network security" Remove constraint Descriptor: "network security"
886 results on '"network security"'

Search Results

1. DeepRoughNetID: A Robust Framework for Network Anomaly Intrusion Detection with High Detection Rates.

2. DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection.

3. Analysis of SQL injection attacks in the cloud and in WEB applications.

4. TRGATLog:基于日志时间图注意力网络的日志异常检测方法.

5. Performance study of fuzzy C-mean clustering algorithm based on local density in network security.

6. The use of intelligent real-time image acquisition system using data mining technology in news acquisition and editing practice.

7. Insight into Anomaly Detection and Prediction and Mobile Network Security Enhancement Leveraging K-Means Clustering on Call Detail Records.

8. Knowledge graph reasoning for cyber attack detection.

9. Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks.

10. A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection.

12. A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management.

13. A Novel Cyber Security Model Using Deep Transfer Learning.

14. A network intrusion detection framework on sparse deep denoising auto-encoder for dimensionality reduction.

15. A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model.

16. Design and implementation of marine information management network security system based on artificial intelligence embedded technology.

17. A review on graph-based approaches for network security monitoring and botnet detection.

18. Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review.

19. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers.

20. Per-user network access control kernel module with secure multifactor authentication.

21. Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions.

22. Owner named entity recognition in website based on multidimensional text guidance and space alignment co-attention.

23. An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

24. Detection strategies for post-pandemic DDoS profiles.

25. A risk source identification model for network security of power CPS system (CPS) based on fuzzy artificial neural network.

26. Evaluating the Isolation Forest Method for Anomaly Detection in Software-Defined Networking Security.

27. Network Attack Chain Security Model Construction Based On Attack Framework.

28. On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs.

29. Theory and Application of Zero Trust Security: A Brief Survey.

30. Sequence Prediction and Classification of Echo State Networks.

31. Design of Network Intrusion Detection System Using Lion Optimization-Based Feature Selection with Deep Learning Model.

32. An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security.

33. Robust DDoS Attack Detection Using Piecewise Harris Hawks Optimizer with Deep Learning for a Secure Internet of Things Environment.

34. Radio optical network security analysis with routing in quantum computing for 5G wireless communication using blockchain machine learning model.

35. Distributed Denial of Service Attack Detection in Network Traffic Using Deep Learning Algorithm.

36. Deep Neural Decision Forest (DNDF): A Novel Approach for Enhancing Intrusion Detection Systems in Network Traffic Analysis.

37. ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.

38. Deep learning for the security of software-defined networks: a review.

39. A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things.

40. A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm.

41. An Analysis of DoS Attack on Robot Operating System.

42. Enhancing Network Visibility and Security with Advanced Port Scanning Techniques.

43. Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research.

44. Malicious Traffic Identification with Self-Supervised Contrastive Learning.

45. Traffic Management in IoT Backbone Networks Using GNN and MAB with SDN Orchestration.

46. Dynamic routing approach for enhancing source location privacy in wireless sensor networks.

47. Intrusion Detection System Based on Pattern Recognition.

48. Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective.

49. An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks.

50. Key management scheme of distributed IoT devices based on blockchains.

Catalog

Books, media, physical & digital resources