Works matching Computer network security
Results: 5000
OPTIMIZATION OF COMPUTER NETWORK SECURITY SYSTEM BASED ON IMPROVED NEURAL NETWORK ALGORITHM AND DATA SEARCHING.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3979, doi. 10.12694/scpe.v25i5.3150
- By:
- Publication type:
- Article
Exploring students' experiences in using a physical laboratory for computer networks and data security.
- Published in:
- Computer Applications in Engineering Education, 2017, v. 25, n. 2, p. 290, doi. 10.1002/cae.21797
- By:
- Publication type:
- Article
CONSIDERATIONS ABOUT COMPUTER NETWORKS SECURITY UNDER VARIOUS OPERATING SYSTEMS.
- Published in:
- Journal of Applied Quantitative Methods, 2010, v. 5, n. 4, p. 571
- By:
- Publication type:
- Article
Intelligent Analysis and Prediction of Computer Network Security Logs Based on Deep Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 22, p. 4556, doi. 10.3390/electronics13224556
- By:
- Publication type:
- Article
NETWORK VIRUS AND COMPUTER NETWORK SECURITY DETECTION TECHNOLOGY OPTIMIZATION.
- Published in:
- Scalable Computing: Practice & Experience, 2021, v. 22, n. 2, p. 161, doi. 10.12694/scpe.v22i2.1881
- By:
- Publication type:
- Article
Computer network security evaluation method based on improved attack graph.
- Published in:
- Journal of Cyber Security Technology, 2022, v. 6, n. 4, p. 201, doi. 10.1080/23742917.2022.2120293
- By:
- Publication type:
- Article
Application of Data Encryption Technology in Computer Network Information Security.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7472205
- By:
- Publication type:
- Article
Research on computer network security evaluation based on image recognition and neural network.
- Published in:
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 11214, doi. 10.1117/1.JEI.32.1.011214
- By:
- Publication type:
- Article
Wild, Unsubstantiated Predictions: The Future of Computer and Network Security.
- Published in:
- Journal of Military & Strategic Studies, 2012, v. 14, n. 2, p. 1
- By:
- Publication type:
- Article
ЗАБЕЗПЕЧЕННЯ ІНФОРМАЦІЙНОЇ БЕЗПЕКИ КОМП’ЮТЕРНОЇ МЕРЕЖІ АВІАКОМПАНІЇ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 3, p. 134, doi. 10.18372/2225-5036.25.14457
- By:
- Publication type:
- Article
Retracted: Encryption Technology for Computer Network Data Security Protection.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Retracted: Computer Network Information Security Monitoring System Based on Big Data Era.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Retracted: Application of Data Encryption Technology in Computer Network Information Security.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Retracted: Application Research of Data Encryption Technology in Computer Network Information Security.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Computer Network Information Security Monitoring System Based on Big Data Era.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3170164
- By:
- Publication type:
- Article
A survey of security visualization for computer network logs.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 4, p. 404, doi. 10.1002/sec.324
- By:
- Publication type:
- Article
Different Security Threats and its Prevention in Computer Network.
- Published in:
- International Journal of Advanced Research in Computer Science, 2016, v. 7, n. 6, p. 85
- By:
- Publication type:
- Article
An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks.
- Published in:
- Journal of Sensors, 2021, p. 1, doi. 10.1155/2021/5558860
- By:
- Publication type:
- Article
Development of a Method for Determining the List of Key Threats to Information Security of Computer Networks.
- Published in:
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 6, p. 1039, doi. 10.18280/ijsse.130606
- By:
- Publication type:
- Article
Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology.
- Published in:
- Advances in Multimedia, 2022, p. 1, doi. 10.1155/2022/6039690
- By:
- Publication type:
- Article
Computer application under the management of network information security technology using genetic algorithm.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 16, p. 7871, doi. 10.1007/s00500-022-06813-6
- By:
- Publication type:
- Article
Application Research of Data Encryption Technology in Computer Network Information Security.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6485195
- By:
- Publication type:
- Article
Encryption Technology for Computer Network Data Security Protection.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1789222
- By:
- Publication type:
- Article
AN AUSTRALIAN PERSPECTIVE ON THE CHALLENGES FOR COMPUTER AND NETWORK SECURITY FOR NOVICE END-USERS.
- Published in:
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 4, p. 51
- By:
- Publication type:
- Article
Implementation Strategy Analysis of Network Security using dalo RADIUS and Pi-hole DNS Server to enhance Computer Network Security, Case Study: XYZ as a Fintech Company.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2024, v. 5, n. 10, p. 4364, doi. 10.59141/jist.v5i10.5321
- By:
- Publication type:
- Article
Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization.
- Published in:
- Issues in Informing Science & Information Technology, 2005, v. 2, p. 159, doi. 10.28945/818
- By:
- Publication type:
- Article
Computer and network security risk management: theory, challenges, and countermeasures.
- Published in:
- International Journal of Communication Systems, 2005, v. 18, n. 8, p. 763, doi. 10.1002/dac.729
- By:
- Publication type:
- Article
Improved Security in Cloud Computer Networks Using RNN Deep Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 365, doi. 10.54216/JCIM.150129
- By:
- Publication type:
- Article
Modeling of neural-network security tools for computer-aided systems: A formal model of adaptation and operation. I.
- Published in:
- Automation & Remote Control, 2008, v. 69, n. 9, p. 1603, doi. 10.1134/S0005117908090130
- By:
- Publication type:
- Article
Flatness Optimization of Network Security Controller Based on Computer Simulation Technology.
- Published in:
- Plastics Science & Technology / Suliao Ke-Ji, 2024, v. 52, n. 5, p. 134, doi. 10.15925/j.cnki.issn1005-3360.2024.05.030
- By:
- Publication type:
- Article
Security in Computer Networks.
- Published in:
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 1, p. 45, doi. 10.19107/ijisc.2018.01.05
- By:
- Publication type:
- Article
Detecting Temporal and Spatial Anomalies in Users' Activities for Security Provisioning in Computer Networks.
- Published in:
- Informatica (03505596), 2023, v. 47, n. 2, p. 295, doi. 10.31449/inf.v47i2.4933
- By:
- Publication type:
- Article
Data security in smart devices: Advancement, constraints and future recommendations.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 6, p. 269, doi. 10.1049/ntw2.12091
- By:
- Publication type:
- Article
EVALUAREA SECURITĂTII RETELELOR DE CALCULATOARE SI SOLUTII PRACTICE DE ADMINISTRARE.
- Published in:
- Studii şi Cercetări de Calcul Economic şi Cibernetică Economică, 2011, v. 45, n. 1/2, p. 95
- By:
- Publication type:
- Article
Virtual monitoring method for computer network security in earth observation communication using multi ant colony random walk classification algorithm.
- Published in:
- Earth Science Informatics, 2024, v. 17, n. 4, p. 3673, doi. 10.1007/s12145-024-01369-5
- By:
- Publication type:
- Article
Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks.
- Published in:
- Neutrosophic Sets & Systems, 2025, v. 77, p. 479
- By:
- Publication type:
- Article
Enhanced CoCoSo Framework for Computer Network Security Evaluation Through Utilizing the Type-2 Neutrosophic Multi-Attribute Group Decision-Making.
- Published in:
- Neutrosophic Sets & Systems, 2025, v. 77, p. 375
- By:
- Publication type:
- Article
Comprehensive Framework for Collaborative Decision-Making in Evaluating Computer Network Security Using Interval Neutrosophic Information.
- Published in:
- Neutrosophic Sets & Systems, 2025, v. 76, p. 520
- By:
- Publication type:
- Article
USING THE SECURITY NETWORK SCANNER GFI LANGUARD TO DISCOVER AND IMPROVE THE VULNERABILITIES IN THE COMPUTER NETWORK SYSTEMS.
- Published in:
- Journal Scientific & Applied Research, 2013, v. 4, p. 74, doi. 10.46687/jsar.v4i1.83
- By:
- Publication type:
- Article
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 513, doi. 10.1049/ntw2.12134
- By:
- Publication type:
- Article
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 339, doi. 10.1049/ntw2.12128
- By:
- Publication type:
- Article
A PU‐learning based approach for cross‐site scripting attacking reality detection.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 4, p. 313, doi. 10.1049/ntw2.12123
- By:
- Publication type:
- Article
FUBA: A fuzzy‐based unmanned aerial vehicle behaviour analytics for trust management in flying ad‐hoc networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 3, p. 208, doi. 10.1049/ntw2.12108
- By:
- Publication type:
- Article
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 2, p. 129, doi. 10.1049/ntw2.12113
- By:
- Publication type:
- Article
Detection of Internet‐wide traffic redirection attacks using machine learning techniques.
- Published in:
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 4, p. 179, doi. 10.1049/ntw2.12085
- By:
- Publication type:
- Article
Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 1, p. 28, doi. 10.1049/ntw2.12098
- By:
- Publication type:
- Article
TRIDSO: Traffic-based Reasoning Intrusion Detection System using Ontology.
- Published in:
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 4, p. 215
- By:
- Publication type:
- Article
Enhancing offloading with cybersecurity in edge computing for digital twin‐driven patient monitoring.
- Published in:
- IET Wireless Sensor Systems (Wiley-Blackwell), 2024, v. 14, n. 6, p. 363, doi. 10.1049/wss2.12086
- By:
- Publication type:
- Article
Blockchain controlled trustworthy federated learning platform for smart homes.
- Published in:
- IET Communications (Wiley-Blackwell), 2024, v. 18, n. 20, p. 1840, doi. 10.1049/cmu2.12870
- By:
- Publication type:
- Article
HealthChain: A blockchain‐based framework for secure and interoperable electronic health records (EHRs).
- Published in:
- IET Communications (Wiley-Blackwell), 2024, v. 18, n. 19, p. 1451, doi. 10.1049/cmu2.12839
- By:
- Publication type:
- Article