Works matching Network security
1
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 3, p. 1, doi. 10.1177/1550147720901999
- Li, Yuanming;
- Guo, Wei;
- Meng, Xuejun;
- Xia, Wen
- Article
2
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1506-1
- Li, Yan;
- Huang, Guang-qiu;
- Wang, Chun-zi;
- Li, Ying-chao
- Article
3
- Railway Signalling & Communication Engineering, 2023, v. 20, n. 12, p. 61, doi. 10.3969/j.issn.1673-4440.2023.12.011
- Article
4
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 11, p. 117, doi. 10.3778/j.issn.1002-8331.2110-0391
- ZHANG Ran;
- PAN Zhihan;
- YIN Yifeng;
- CAI Zengyu
- Article
5
- International Journal of Intelligent Engineering & Systems, 2018, v. 11, n. 3, p. 196, doi. 10.22266/ijies2018.0630.21
- Mahendiran, Azhagiri;
- Appusamy, Rajesh
- Article
6
- Journal of Beijing University of Technology, 2019, v. 45, n. 5, p. 436, doi. 10.11936/bjutxb2017090011
- Article
7
- Computers, Materials & Continua, 2019, v. 59, n. 1, p. 167, doi. 10.32604/cmc.2019.05192
- Weihong Han;
- Zhihong Tian;
- Zizhong Huang;
- Lin Zhong;
- Yan Jia
- Article
8
- Journal of Information System Security, 2012, v. 8, n. 3, p. 29
- Luse, Andy;
- Mennecke, Brian;
- Townsend, Anthony;
- Jacobson, Doug
- Article
9
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 8, p. 116, doi. 10.26483/ijarcs.v8i8.4641
- Khan, Ruzaina;
- Hasan, Mohammad
- Article
10
- Complex & Intelligent Systems, 2023, v. 9, n. 3, p. 3429, doi. 10.1007/s40747-022-00899-z
- Wu, Xuesong;
- Du, Ye;
- Fan, Tao;
- Guo, Junyan;
- Ren, Jie;
- Wu, Runfang;
- Zheng, Tianshuai
- Article
11
- Journal of Cyber Security Technology, 2025, v. 9, n. 3, p. 169, doi. 10.1080/23742917.2024.2367795
- Yu, Chongchong;
- Huang, Liping;
- Wu, Lei
- Article
12
- SPIN (2010-3247), 2025, v. 15, n. 3, p. 1, doi. 10.1142/S201032472550002X
- Chen, Wei;
- Tian, Yuan;
- Li, Da
- Article
13
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1634
- Sood, Ashima;
- Ailawalia, Praveen
- Article
14
- Police Practice & Research, 2008, v. 9, n. 3, p. 213, doi. 10.1080/15614260701797520
- Article
15
- International Journal of Network Management, 2025, v. 35, n. 2, p. 1, doi. 10.1002/nem.70003
- Article
16
- Metallurgical & Mining Industry, 2015, n. 10, p. 46
- Bing Liu;
- Yang Zhao;
- Yuanyuan Dang
- Article
17
- International Journal of Distributed Sensor Networks, 2021, v. 17, n. 2, p. 1, doi. 10.1177/1550147721999285
- Liu, Yongshan;
- Wang, Jianjun;
- He, Haitao;
- Huang, Guoyan;
- Shi, Weibo
- Article
18
- International Journal of Distributed Sensor Networks, 2020, v. 16, n. 11, p. 1, doi. 10.1177/1550147720971517
- Tao, Xiaoling;
- Kong, Kaichuan;
- Zhao, Feng;
- Cheng, Siyan;
- Wang, Sufang
- Article
19
- Fractals, 2022, v. 30, n. 2, p. 1, doi. 10.1142/S0218348X22400904
- DING, CAICHANG;
- CHEN, YIQIN;
- ALGARNI, ABDULLAH M.;
- ZHANG, GUOJUN;
- PENG, HONGHUI
- Article
20
- Fractals, 2022, v. 30, n. 2, p. 1, doi. 10.1142/S0218348X22400679
- DING, CAICHANG;
- CHEN, YIQIN;
- LIU, ZHIYUAN;
- ALSHEHRI, AHMED MOHAMMED;
- LIU, TIANYIN
- Article
21
- International Journal of Online Engineering, 2018, v. 14, n. 2, p. 48, doi. 10.3991/ijoe.v14i02.8201
- Article
22
- Multimedia Tools & Applications, 2023, v. 82, n. 15, p. 23615, doi. 10.1007/s11042-023-14795-2
- Mohy-eddine, Mouaad;
- Guezzaz, Azidine;
- Benkirane, Said;
- Azrour, Mourade
- Article
23
- Naval Research Logistics, 2009, v. 56, n. 7, p. 625, doi. 10.1002/nav.20365
- Schavland, Jeffrey;
- Chan, Yupo;
- Raines, Richard A.
- Article
24
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 11214, doi. 10.1117/1.JEI.32.1.011214
- Wang, Zilong;
- Shi, Lin;
- Chen, Ning;
- Chen, Jie
- Article
25
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 11207, doi. 10.1117/1.JEI.32.1.011207
- Shi, Lin;
- Ma, Yang;
- Lv, Yan;
- Chen, Liquan
- Article
26
- Advanced Control for Applications, 2024, v. 6, n. 2, p. 1, doi. 10.1002/adc2.143
- Wu, Xiao;
- Yang, Yueping;
- Fan, Xuefeng;
- Yu, Yanhan;
- Wu, Yingyan
- Article
27
- International Journal of Modeling, Simulation & Scientific Computing, 2022, v. 13, n. 6, p. 1, doi. 10.1142/S1793962322500544
- Xie, Linjiang;
- Hang, Feilu;
- Guo, Wei;
- Zhang, Zhenhong;
- Li, Hanruo
- Article
28
- International Journal of Performability Engineering, 2020, v. 16, n. 8, p. 1171, doi. 10.23940/ijpe.20.08.p4.11711182
- Ran Zhang;
- Min Liu;
- Yifeng Yin;
- Qikun Zhang;
- Zengyu Cai
- Article
29
- International Journal of Performability Engineering, 2019, v. 15, n. 12, p. 3332, doi. 10.23940/ijpe.19.12.p26.33323340
- Banggui Liu;
- Qingsheng Zeng
- Article
30
- Review of International Affairs (04866096), 2025, v. 75, n. 1193, p. 85, doi. 10.18485/iipe_ria.2025.76.1193.4
- AĞIR, Bülent Sarper;
- MUTLU, Orçun;
- GÜRSOY, Barış
- Article
31
- Informatica (03505596), 2022, v. 46, n. 1, p. 87, doi. 10.31449/inf.v46i1.3775
- Article
32
- Journal of Frontiers of Computer Science & Technology, 2025, v. 19, n. 7, p. 1958, doi. 10.3778/j.issn.1673-9418.2410013
- Article
33
- Journal of Network & Information Security, 2024, v. 12, n. 1, p. 8
- Article
34
- Journal of Hebei University of Science & Technology, 2021, v. 42, n. 2, p. 195, doi. 10.7535/hbkd.2021yx02012
- Article
35
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) / Chongqing Youdian Daxue Xuebao (Ziran Kexue Ban), 2020, v. 32, n. 1, p. 23, doi. 10.3979/j.issn.1673-825X.2020.01.003
- Article
36
- Eastern-European Journal of Enterprise Technologies, 2024, v. 130, n. 2, p. 6, doi. 10.15587/1729-4061.2024.305696
- Jumagaliyeva, Ainur;
- Abdykerimova, Elmira;
- Turkmenbayev, Asset;
- Serimbetov, Bulat;
- Muratova, Gulzhan;
- Yersultanova, Zauresh;
- Zhiyembayev, Zhomart
- Article
37
- International Journal of Information Security, 2024, v. 23, n. 1, p. 119, doi. 10.1007/s10207-023-00742-7
- Lagraa, Sofiane;
- Husák, Martin;
- Seba, Hamida;
- Vuppala, Satyanarayana;
- State, Radu;
- Ouedraogo, Moussa
- Article
38
- International Journal of Information Security, 2008, v. 7, n. 2, p. 103, doi. 10.1007/s10207-007-0045-7
- Alfaro, J. G.;
- Boulahia-Cuppens, N.;
- Cuppens, F.
- Article
39
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 71, doi. 10.1007/s10207-004-0060-x
- Lye, Kong-wei;
- Wing, Jeannette M.
- Article
40
- Future Internet, 2024, v. 16, n. 7, p. 226, doi. 10.3390/fi16070226
- Cunha, José;
- Ferreira, Pedro;
- Castro, Eva M.;
- Oliveira, Paula Cristina;
- Nicolau, Maria João;
- Núñez, Iván;
- Sousa, Xosé Ramon;
- Serôdio, Carlos
- Article
41
- Journal of Network & Systems Management, 2019, v. 27, n. 3, p. 600, doi. 10.1007/s10922-018-9478-8
- Article
42
- International Review on Computers & Software, 2013, v. 8, n. 2, p. 527
- Article
43
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 42, p. 1, doi. 10.5013/IJSSST.a.17.42.07
- Rui WU;
- Jun ZHU;
- xiaolong ZHAO
- Article
44
- International Journal of Simulation: Systems, Science & Technology, 2016, v. 17, n. 36, p. 1, doi. 10.5013/IJSSST.a.17.36.10
- Article
45
- Journal of Cybersecurity & Information Management, 2024, v. 13, n. 1, p. 60, doi. 10.54216/JCIM.130106
- Aziz, Ahmed;
- Mirzaliev, Sanjar
- Article
46
- Journal of Coastal Research, 2020, v. 110, p. 223, doi. 10.2112/JCR-SI110-053.1
- Article
47
- Journal of Coastal Research, 2020, v. 95, p. 991, doi. 10.2112/SI95-193.1
- Zhou, Hongzhi;
- Yu, Gan;
- Li, Linguo
- Article
48
- Asian Journal of Information Science & Technology (AJIST), 2023, v. 13, n. 1, p. 41, doi. 10.51983/ajist-2023.13.1.3487
- Article
49
- International Journal of Software & Informatics, 2014, v. 8, n. 2, p. 167
- Article
50
- IEEE Transactions on Dependable & Secure Computing, 2014, v. 11, n. 1, p. 30, doi. 10.1109/TDSC.2013.24
- Wang, Lingyu;
- Jajodia, Sushil;
- Singhal, Anoop;
- Cheng, Pengsu;
- Noel, Steven
- Article