Works matching DE "COMPUTER network security"
Results: 4924
'Cops Are Cops': American Campus Police and the Global Carceral Apparatus.
- Published in:
- Comparative American Studies, 2020, v. 17, n. 3/4, p. 242, doi. 10.1080/14775700.2021.1895039
- By:
- Publication type:
- Article
The Right to Access Legal Information: Progress and Evolving Norms in a Digital Age.
- Published in:
- Law Library Journal, 2022, v. 114, n. 3, p. 261
- By:
- Publication type:
- Article
Multi-Attribute Decision-Making for Intrusion Detection Systems: A Systematic Review.
- Published in:
- International Journal of Information Technology & Decision Making, 2023, v. 22, n. 1, p. 589, doi. 10.1142/S021962202230004X
- By:
- Publication type:
- Article
Multiobjective Decision Support in IT-Risk Management.
- Published in:
- International Journal of Information Technology & Decision Making, 2002, v. 1, n. 2, p. 251, doi. 10.1142/S0219622002000154
- By:
- Publication type:
- Article
Stopping Cyberattacks: Strategies for Dental Office Data Security.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2021, v. 42, n. 1, p. 11
- By:
- Publication type:
- Article
Analysis of network traffic features for anomaly detection.
- Published in:
- Machine Learning, 2015, v. 101, n. 1-3, p. 59, doi. 10.1007/s10994-014-5473-9
- By:
- Publication type:
- Article
Analysis of Security Threats in the Supply Chain of ICT Products Based on Evolutionary Game Theory.
- Published in:
- Group Decision & Negotiation, 2023, v. 32, n. 5, p. 1183, doi. 10.1007/s10726-023-09839-9
- By:
- Publication type:
- Article
Computing the weighted neighbor isolated tenacity of interval graphs in polynomial time.
- Published in:
- Numerical Methods for Partial Differential Equations, 2021, v. 37, n. 3, p. 2540, doi. 10.1002/num.22736
- By:
- Publication type:
- Article
Remote control of CNC machines using the CyberOPC communication system over public networks.
- Published in:
- International Journal of Advanced Manufacturing Technology, 2008, v. 39, n. 5/6, p. 570, doi. 10.1007/s00170-007-1244-0
- By:
- Publication type:
- Article
Owner named entity recognition in website based on multidimensional text guidance and space alignment co-attention.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 6, p. 3757, doi. 10.1007/s00530-023-01170-2
- By:
- Publication type:
- Article
Implementation and evaluation of a remote authentication system using touchless palmprint recognition.
- Published in:
- Multimedia Systems, 2013, v. 19, n. 2, p. 117, doi. 10.1007/s00530-012-0283-z
- By:
- Publication type:
- Article
Novel Approach of Key Predistribution for Grid Based Sensor Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 108, n. 2, p. 939, doi. 10.1007/s11277-019-06442-7
- By:
- Publication type:
- Article
Revisiting the Security of Qian et al.'s Revised Tree-LSHB+ Protocol.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 2, p. 321, doi. 10.1007/s11277-019-06164-w
- By:
- Publication type:
- Article
An Implementation of Convergence Security Solution for Overcoming of Security Vulnerabilities in Industrial Control Communication Network.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 2, p. 545, doi. 10.1007/s11277-018-5970-4
- By:
- Publication type:
- Article
A Secure PUF-Based Unilateral Authentication Scheme for RFID System.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1699, doi. 10.1007/s11277-018-5875-2
- By:
- Publication type:
- Article
One Secure Attribute-Based Proxy Signature.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 2, p. 1273, doi. 10.1007/s11277-018-5508-9
- By:
- Publication type:
- Article
Local Dynamic Key Management Scheme Based on Layer-Cluster Topology in WSN.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 699, doi. 10.1007/s11277-018-5471-5
- By:
- Publication type:
- Article
Trust Value Evolutionary Simulation Based a Whole-process and Multi-round Opinion Propagative Model.
- Published in:
- Wireless Personal Communications, 2018, v. 103, n. 1, p. 677, doi. 10.1007/s11277-018-5470-6
- By:
- Publication type:
- Article
Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 2, p. 1401, doi. 10.1007/s11277-017-5202-3
- By:
- Publication type:
- Article
A Trusted Waterfall Framework Based Peer to Peer Protocol for Reliable and Energy Efficient Data Transmission in MANETs.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 95, doi. 10.1007/s11277-018-5829-8
- By:
- Publication type:
- Article
Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow.
- Published in:
- Wireless Personal Communications, 2018, v. 101, n. 4, p. 2127, doi. 10.1007/s11277-018-5808-0
- By:
- Publication type:
- Article
Efficient Techniques for Attack Detection Using Different Features Selection Algorithms and Classifiers.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1689, doi. 10.1007/s11277-018-5662-0
- By:
- Publication type:
- Article
Intrusion Detection System Against Colluding Misbehavior in MANETs.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 2, p. 491, doi. 10.1007/s11277-017-5094-2
- By:
- Publication type:
- Article
Entropy-Based Anomaly Detection in a Network.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 4, p. 1487, doi. 10.1007/s11277-018-5288-2
- By:
- Publication type:
- Article
An Innovative Application of Virus Taxonomy and Nomenclatures in the Information Technology.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 1, p. 1237, doi. 10.1007/s11277-017-4917-5
- By:
- Publication type:
- Article
A Neural Network-Based Learning Algorithm for Intrusion Detection Systems.
- Published in:
- Wireless Personal Communications, 2017, v. 97, n. 2, p. 3097, doi. 10.1007/s11277-017-4663-8
- By:
- Publication type:
- Article
A Countermeasure to SQL Injection Attack for Cloud Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 4, p. 5279, doi. 10.1007/s11277-016-3741-7
- By:
- Publication type:
- Article
An Overview of Trust-Based Routing Design Under Adversarial Mobile Ad Hoc Network Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 3, p. 3923, doi. 10.1007/s11277-017-4359-0
- By:
- Publication type:
- Article
A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2821, doi. 10.1007/s11277-017-4326-9
- By:
- Publication type:
- Article
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3185, doi. 10.1007/s11277-017-3990-0
- By:
- Publication type:
- Article
Improving the Physical Layer Security in Cooperative Networks with Multiple Eavesdroppers.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 3295, doi. 10.1007/s11277-017-3998-5
- By:
- Publication type:
- Article
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 497, doi. 10.1007/s11277-015-3128-1
- By:
- Publication type:
- Article
Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 1799, doi. 10.1007/s11277-016-3712-z
- By:
- Publication type:
- Article
Cryptanalysis and Improvement in User Authentication and Key Agreement Scheme for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2017, v. 94, n. 3, p. 1881, doi. 10.1007/s11277-016-3717-7
- By:
- Publication type:
- Article
A Robust and Efficient Privacy Aware Handover Authentication Scheme for Wireless Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 2, p. 311, doi. 10.1007/s11277-015-3139-y
- By:
- Publication type:
- Article
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 2, p. 571, doi. 10.1007/s11277-016-3802-y
- By:
- Publication type:
- Article
A Secure and Efficient V2V Authentication Method in Heavy Traffic Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 93, n. 1, p. 245, doi. 10.1007/s11277-016-3884-6
- By:
- Publication type:
- Article
A Differential Game Model Between Intrusion Detection System and Attackers for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 90, n. 3, p. 1211, doi. 10.1007/s11277-016-3386-6
- By:
- Publication type:
- Article
A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 447, doi. 10.1007/s11277-016-3281-1
- By:
- Publication type:
- Article
CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 479, doi. 10.1007/s11277-016-3283-z
- By:
- Publication type:
- Article
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security.
- Published in:
- Wireless Personal Communications, 2016, v. 89, n. 2, p. 569, doi. 10.1007/s11277-016-3293-x
- By:
- Publication type:
- Article
A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1611, doi. 10.1007/s11277-015-3010-1
- By:
- Publication type:
- Article
Design and Analysis of a Provably Secure Multi-server Authentication Scheme.
- Published in:
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1095, doi. 10.1007/s11277-015-2975-0
- By:
- Publication type:
- Article
PSP CO: An Efficient Hardware Architecture for AES Algorithm for High Throughput.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 1, p. 305, doi. 10.1007/s11277-015-2739-x
- By:
- Publication type:
- Article
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 1, p. 439, doi. 10.1007/s11277-015-2616-7
- By:
- Publication type:
- Article
LKH++ Based Group Key Management Scheme for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2015, v. 83, n. 4, p. 3057, doi. 10.1007/s11277-015-2582-0
- By:
- Publication type:
- Article
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 4, p. 2727, doi. 10.1007/s11277-015-2375-5
- By:
- Publication type:
- Article
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 3, p. 1377, doi. 10.1007/s11277-015-2288-3
- By:
- Publication type:
- Article
Secure Content Distribution Using Multi-hop Proxy Re-encryption.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 3, p. 1449, doi. 10.1007/s11277-015-2292-7
- By:
- Publication type:
- Article
Authentication User's Privacy: An Integrating Location Privacy Protection Algorithm for Secure Moving Objects in Location Based Services.
- Published in:
- Wireless Personal Communications, 2015, v. 82, n. 3, p. 1585, doi. 10.1007/s11277-015-2300-y
- By:
- Publication type:
- Article