Works matching DE "DEEP packet inspection (Computer security)"
1
- Journal of Artificial Intelligence (2579-0021), 2022, v. 4, n. 3, p. 133, doi. 10.32604/jai.2022.031800
- Jie Luo;
- Qingbing Ji;
- Lvlin Ni
- Article
2
- Future Internet, 2024, v. 16, n. 12, p. 470, doi. 10.3390/fi16120470
- Kenyon, Anthony;
- Deka, Lipika;
- Elizondo, David
- Article
3
- Insight: Non-Destructive Testing & Condition Monitoring, 2013, p. 1
- Article
4
- Science & Technology Studies, 2023, v. 36, n. 2, p. 81, doi. 10.23987/sts.114398
- Article
5
- Egyptian Computer Science Journal, 2018, v. 42, n. 2, p. 13
- Article
6
- Applied Sciences (2076-3417), 2017, v. 7, n. 10, p. 1082, doi. 10.3390/app7101082
- Pimenta Rodrigues, Gabriel Arquelau;
- de Oliveira Albuquerque, Robson;
- de Deus, Flávio Elias Gomes;
- de Sousa Jr., Rafael Timóteo;
- de Oliveira Júnior, Gildásio Antônio;
- García Villalba, Luis Javier;
- Tai-Hoon Kim
- Article
7
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- Bouet, Mathieu;
- Leguay, Jérémie;
- Combe, Théo;
- Conan, Vania
- Article
8
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1779, doi. 10.1007/s11036-022-02000-x
- Liu, Qiang;
- Shea, Ryan;
- Liu, Zhi;
- Wang, Zehua;
- Hu, Han
- Article
9
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1867, doi. 10.1007/s11036-019-01402-8
- Deng, Jun;
- Cai, He;
- Chen, Sheng;
- Ren, Jianji;
- Wang, Xiaofei
- Article
10
- Wireless Personal Communications, 2022, v. 127, n. 1, p. 217, doi. 10.1007/s11277-021-08208-6
- Kumar, Sathish A. P.;
- Suresh, A.;
- Anand, S. Raj;
- Chokkanathan, K.;
- Vijayasarathy, M.
- Article
11
- Wireless Personal Communications, 2020, v. 115, n. 2, p. 993, doi. 10.1007/s11277-020-07608-4
- Praise, J. Jeya;
- Raj, R. Joshua Samuel;
- Benifa, J. V. Bibal
- Article
12
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7937, doi. 10.3390/app12157937
- Chen, Yongxin;
- Wang, Yongjun;
- Yang, Luming
- Article
13
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 2, p. 556, doi. 10.1080/20421338.2020.1866147
- Dairo, Adeolu;
- Szűcs, Krisztián
- Article
14
- Telecommunication Systems, 2017, v. 65, n. 1, p. 155, doi. 10.1007/s11235-016-0223-x
- Wan, Ming;
- Shang, Wenli;
- Kong, Linghe;
- Zeng, Peng
- Article
15
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3676692
- Gomez, Gibran;
- Kotzias, Platon;
- Dell'Amico, Matteo;
- Bilge, Leyla;
- Caballero, Juan
- Article
16
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3804, doi. 10.3837/tiis.2018.08.014
- Dubin, Ran;
- Hadar, Ofer;
- Dvir, Amit;
- Pele, Ofir
- Article
17
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 4, p. 153, doi. 10.1080/19393555.2017.1328544
- K, Anusha;
- E, Sathiyamoorthy
- Article
18
- IET Communications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1751, doi. 10.1049/iet-com.2017.0091
- Article
20
- Journal of Computer Networks & Communications, 2023, p. 1, doi. 10.1155/2023/1495642
- Wassie Geremew, Getahun;
- Ding, Jianguo
- Article
21
- International Journal of Information Security, 2017, v. 16, n. 5, p. 475, doi. 10.1007/s10207-016-0344-y
- Duessel, Patrick;
- Gehl, Christian;
- Flegel, Ulrich;
- Dietrich, Sven;
- Meier, Michael
- Article
22
- International Journal of Network Management, 2021, v. 31, n. 5, p. 1, doi. 10.1002/nem.2151
- Rosário, Denis;
- Villas, Leandro A.
- Article
23
- International Journal of Network Management, 2021, v. 31, n. 4, p. 1, doi. 10.1002/nem.2147
- Arfeen, Asad;
- Ul Haq, Khizar;
- Yasir, Syed Muhammad
- Article
24
- Algorithms, 2017, v. 10, n. 1, p. 16, doi. 10.3390/a10010016
- Yi-Shan Lin;
- Chun-Liang Lee;
- Yaw-Chung Chen
- Article
25
- Neural Computing & Applications, 2025, v. 37, n. 8, p. 5991, doi. 10.1007/s00521-024-10967-9
- Rahim, Kashif;
- Nasir, Zia Ul Islam;
- Ikram, Nassar;
- Qureshi, Hassaan Khaliq
- Article
26
- Governance, 2019, v. 32, n. 1, p. 103, doi. 10.1111/gove.12353
- Ball, Kirstie;
- Degli Esposti, Sara;
- Dibb, Sally;
- Pavone, Vincenzo;
- Santiago‐Gomez, Elvira
- Article
27
- Ohio State Law Journal, 2013, v. 74, n. 6, p. 1195
- MARGONI, THOMAS;
- PERRY, MARK
- Article
28
- Nigde Omer Halisdemir University Journal of Engineering Sciences / Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi, 2023, v. 12, n. 1, p. 1, doi. 10.28948/ngmuh.1184020
- Çelebi, Merve;
- Özbilen, Alper;
- Yavanoğlu, Uraz
- Article
29
- Duzce University Journal of Science & Technology, 2023, v. 11, n. 3, p. 1546, doi. 10.29130/dubited.1131544
- ÇELEBİ, Merve;
- YAVANOĞLU, Uraz
- Article
30
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142184
- Altaha, Mustafa;
- Hong, Sugwon
- Article
31
- Electronics (2079-9292), 2021, v. 10, n. 12, p. 1376, doi. 10.3390/electronics10121376
- Huang, Yung-Fa;
- Lin, Chuan-Bi;
- Chung, Chien-Min;
- Chen, Ching-Mu
- Article
32
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 27, doi. 10.3390/electronics10010027
- Mun, Hyunsu;
- Lee, Youngseok
- Article
33
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- Kim, So-Yeon;
- Yun, Sun-Woo;
- Lee, Eun-Young;
- Bae, So-Hyeon;
- Lee, Il-Gu
- Article
34
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- Prabha, Rama;
- Jayanthi R., K. P.
- Article
35
- Connection Science, 2022, v. 34, n. 1, p. 1322, doi. 10.1080/09540091.2022.2067124
- Xin, Liu;
- Ziang, Liu;
- Yingli, Zhang;
- Wenqiang, Zhang;
- Dong, Lv;
- Qingguo, Zhou
- Article
36
- Connection Science, 2022, v. 34, n. 1, p. 1322, doi. 10.1080/09540091.2022.2067124
- Xin, Liu;
- Ziang, Liu;
- Yingli, Zhang;
- Wenqiang, Zhang;
- Dong, Lv;
- Qingguo, Zhou
- Article
37
- PLoS ONE, 2018, v. 13, n. 10, p. 1, doi. 10.1371/journal.pone.0206068
- Xu, Chengcheng;
- Su, Jinshu;
- Chen, Shuhui
- Article
38
- Journal of Network & Systems Management, 2015, v. 23, n. 3, p. 401, doi. 10.1007/s10922-013-9293-1
- Carela-Español, Valentín;
- Barlet-Ros, Pere;
- Mula-Valls, Oriol;
- Solé-Pareta, Josep
- Article
39
- Surveillance & Society, 2015, v. 13, n. 3/4, p. 437, doi. 10.24908/ss.v13i3/4.5400
- Degli Esposti, Sara;
- Santiago Gómez, Elvira
- Article
40
- Surveillance & Society, 2012, v. 9, n. 4, p. 348, doi. 10.24908/ss.v9i4.4340
- Mueller, Milton;
- Kuehn, Andreas;
- Santoso, Stephanie Michelle
- Article
41
- Microwave Journal, 2023, v. 66, n. 1, p. 42
- Article
42
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 908, doi. 10.3969/j.issn.1001-3695.2014.03.065
- Article
43
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4743078
- Article
44
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 3, p. 853, doi. 10.18280/ijsse.140317
- Dhumane, Amol;
- Sakhare, Nitin N.;
- Dehankar, Pooja;
- Kumar, Jambi Ratna Raja;
- Patil, Sheetal S.;
- Tatiya, Manjusha
- Article
45
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 2, p. 424, doi. 10.1007/s12083-015-0350-2
- Qin, Tao;
- Wang, Lei;
- Zhao, Dan;
- Zhu, Min
- Article
46
- Iraqi Journal for Computers & Informatics Ijci, 2024, v. 50, n. 2, p. 8, doi. 10.25195/ijci.v50i2.501
- DOSUNMU, Margaret Moronke;
- AYO, Femi Emmanuel;
- OGUNDELE, Lukman Adebayo;
- TAIWO, Abass Ishola
- Article
47
- Archives of Computational Methods in Engineering, 2021, v. 28, n. 3, p. 1371, doi. 10.1007/s11831-020-09419-z
- Samuel, Prithi;
- Subbaiyan, Sumathi;
- Balusamy, Balamurugan;
- Doraikannan, Sumathi;
- Gandomi, Amir H.
- Article
48
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- Salau, Ayodeji Olalekan;
- Beyene, Melesew Mossie
- Article
49
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 565, doi. 10.26483/ijarcs.v8i7.4220
- Gupta, Kunal;
- Singh, Rajni Ranjan
- Article
50
- Serbian Journal of Electrical Engineering, 2021, v. 18, n. 2, p. 237, doi. 10.2298/SJEE2102237I
- Ilievski, Gjorgji;
- Latkoski, Pero
- Article