Works matching DE "DEEP packet inspection (Computer security)"
1
- Mobile Networks & Applications, 2024, v. 29, n. 6, p. 2004, doi. 10.1007/s11036-024-02321-z
- Chiang, Wei-Kuo;
- Li, Tsung-Ying
- Article
2
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 4, p. 794, doi. 10.3390/jcp4040037
- Foreman, Justin;
- Waters, Willie L.;
- Kamhoua, Charles A.;
- Hemida, Ahmed H. Anwar;
- Acosta, Jaime C.;
- Dike, Blessing C.
- Article
3
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2307
- Bringhenti, Daniele;
- Pizzato, Francesco;
- Sisto, Riccardo;
- Valenza, Fulvio
- Article
4
- International Journal of Network Management, 2021, v. 31, n. 5, p. 1, doi. 10.1002/nem.2151
- Rosário, Denis;
- Villas, Leandro A.
- Article
5
- International Journal of Network Management, 2021, v. 31, n. 4, p. 1, doi. 10.1002/nem.2147
- Arfeen, Asad;
- Ul Haq, Khizar;
- Yasir, Syed Muhammad
- Article
6
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- Bouet, Mathieu;
- Leguay, Jérémie;
- Combe, Théo;
- Conan, Vania
- Article
7
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3676692
- Gomez, Gibran;
- Kotzias, Platon;
- Dell'Amico, Matteo;
- Bilge, Leyla;
- Caballero, Juan
- Article
8
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/4743078
- Article
9
- PLoS ONE, 2018, v. 13, n. 10, p. 1, doi. 10.1371/journal.pone.0206068
- Xu, Chengcheng;
- Su, Jinshu;
- Chen, Shuhui
- Article
10
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 2, p. 424, doi. 10.1007/s12083-015-0350-2
- Qin, Tao;
- Wang, Lei;
- Zhao, Dan;
- Zhu, Min
- Article
11
- Science & Technology Studies, 2023, v. 36, n. 2, p. 81, doi. 10.23987/sts.114398
- Article
12
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 565, doi. 10.26483/ijarcs.v8i7.4220
- Gupta, Kunal;
- Singh, Rajni Ranjan
- Article
13
- Neural Computing & Applications, 2025, v. 37, n. 8, p. 5991, doi. 10.1007/s00521-024-10967-9
- Rahim, Kashif;
- Nasir, Zia Ul Islam;
- Ikram, Nassar;
- Qureshi, Hassaan Khaliq
- Article
14
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0126517
- Kim, HyunJin;
- Choi, Kang-Il;
- Choi, Sang-Il
- Article
15
- Multimedia Tools & Applications, 2024, v. 83, n. 40, p. 87903, doi. 10.1007/s11042-024-18845-1
- Article
16
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/5523834
- Chu, Xiaolu;
- Cheng, Ke;
- Song, Anxiao;
- Fu, Jiaxuan;
- C., Puttamadappa
- Article
17
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 381, doi. 10.1049/iet-ifs.2017.0421
- Ho, ThienLuan;
- Cho, Seong‐Je;
- Oh, Seung‐Rohk
- Article
18
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 104, doi. 10.1049/iet-ifs.2015.0246
- Trabelsi, Zouheir;
- Zeidan, Safaa;
- Masud, Mohammad M.
- Article
19
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 327, doi. 10.1049/iet-ifs.2012.0340
- Cronin, Brendan;
- Wang, Xiaojun
- Article
20
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- Prabha, Rama;
- Jayanthi R., K. P.
- Article
21
- Journal of Computer Networks & Communications, 2023, p. 1, doi. 10.1155/2023/1495642
- Wassie Geremew, Getahun;
- Ding, Jianguo
- Article
22
- ICTACT Journal on Communication Technology, 2021, v. 12, n. 1, p. 2239, doi. 10.21917/ijct.2021.0345
- Shanmugaraja, P.;
- Chokkanathan, K.;
- Thangaraj, K.;
- Ilanchezhian, P.
- Article
23
- Telecommunication Systems, 2017, v. 65, n. 1, p. 155, doi. 10.1007/s11235-016-0223-x
- Wan, Ming;
- Shang, Wenli;
- Kong, Linghe;
- Zeng, Peng
- Article
24
- IAENG International Journal of Computer Science, 2024, v. 51, n. 4, p. 409
- Lokesh, Bommareddy;
- Rajagopalan, Narendran
- Article
25
- IAENG International Journal of Computer Science, 2022, v. 49, n. 4, p. 1002
- Nuñez-Agurto, Daniel;
- Fuertes, Walter;
- Marrone, Luis;
- Macas, Mayra
- Article
26
- Surveillance & Society, 2015, v. 13, n. 3/4, p. 437, doi. 10.24908/ss.v13i3/4.5400
- Degli Esposti, Sara;
- Santiago Gómez, Elvira
- Article
27
- Surveillance & Society, 2012, v. 9, n. 4, p. 348, doi. 10.24908/ss.v9i4.4340
- Mueller, Milton;
- Kuehn, Andreas;
- Santoso, Stephanie Michelle
- Article
28
- Archives of Computational Methods in Engineering, 2021, v. 28, n. 3, p. 1371, doi. 10.1007/s11831-020-09419-z
- Samuel, Prithi;
- Subbaiyan, Sumathi;
- Balusamy, Balamurugan;
- Doraikannan, Sumathi;
- Gandomi, Amir H.
- Article
29
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 23
- Breitinger, Frank;
- Baggili, Ibrahim
- Article
30
- Journal of Supercomputing, 2019, v. 75, n. 6, p. 3317, doi. 10.1007/s11227-018-2517-0
- Sun, Ruxia;
- Shi, Lingfeng;
- Yin, Chunyong;
- Wang, Jin
- Article
31
- Wireless Personal Communications, 2022, v. 127, n. 1, p. 217, doi. 10.1007/s11277-021-08208-6
- Kumar, Sathish A. P.;
- Suresh, A.;
- Anand, S. Raj;
- Chokkanathan, K.;
- Vijayasarathy, M.
- Article
32
- Wireless Personal Communications, 2022, v. 125, n. 1, p. 1, doi. 10.1007/s11277-022-09538-9
- Choudhary, Deepak;
- Pahuja, Roop
- Article
33
- Wireless Personal Communications, 2020, v. 115, n. 2, p. 993, doi. 10.1007/s11277-020-07608-4
- Praise, J. Jeya;
- Raj, R. Joshua Samuel;
- Benifa, J. V. Bibal
- Article
34
- IET Communications (Wiley-Blackwell), 2017, v. 11, n. 11, p. 1751, doi. 10.1049/iet-com.2017.0091
- Article
35
- Journal of Artificial Intelligence (2579-0021), 2022, v. 4, n. 3, p. 133, doi. 10.32604/jai.2022.031800
- Jie Luo;
- Qingbing Ji;
- Lvlin Ni
- Article
36
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142184
- Altaha, Mustafa;
- Hong, Sugwon
- Article
37
- Electronics (2079-9292), 2021, v. 10, n. 12, p. 1376, doi. 10.3390/electronics10121376
- Huang, Yung-Fa;
- Lin, Chuan-Bi;
- Chung, Chien-Min;
- Chen, Ching-Mu
- Article
38
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 27, doi. 10.3390/electronics10010027
- Mun, Hyunsu;
- Lee, Youngseok
- Article
39
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- Kim, So-Yeon;
- Yun, Sun-Woo;
- Lee, Eun-Young;
- Bae, So-Hyeon;
- Lee, Il-Gu
- Article
40
- Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) / Chongqing Youdian Daxue Xuebao (Ziran Kexue Ban), 2014, v. 26, n. 3, p. 292, doi. 10.3979/j.issn.1673-825X.2014.03.002
- YANG Fengrui;
- JIANG Mingzhi;
- ZHANG Yanrong;
- ZHANG Zhizhong
- Article
41
- Mülkiye Dergisi, 2013, v. 37, n. 3, p. 37
- Aydın, Duygu Hatipoğlu;
- Ceyhan, Çağdaş;
- Aydın, Mustafa Berkay
- Article
42
- Sensors (14248220), 2024, v. 24, n. 3, p. 898, doi. 10.3390/s24030898
- Ji, Il Hwan;
- Lee, Ju Hyeon;
- Kang, Min Ji;
- Park, Woo Jin;
- Jeon, Seung Ho;
- Seo, Jung Taek
- Article
43
- Sensors (14248220), 2021, v. 21, n. 4, p. 1140, doi. 10.3390/s21041140
- Papadogiannaki, Eva;
- Ioannidis, Sotiris;
- Giordano, Stefano
- Article
44
- Ohio State Law Journal, 2013, v. 74, n. 6, p. 1195
- MARGONI, THOMAS;
- PERRY, MARK
- Article
45
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1395
- Article
46
- Journal of Information Science & Engineering, 2014, v. 30, n. 3, p. 819
- HANSOON KIM;
- YOUNGLOK KIM;
- JU WOOK JANG
- Article
47
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 8, p. 1963, doi. 10.1007/s00500-015-1892-1
- Chen, Zhenxiang;
- Liu, Zhusong;
- Peng, Lizhi;
- Wang, Lin;
- Zhang, Lei
- Article
48
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 4, p. 373, doi. 10.22266/ijies2021.0831.33
- Alkhalidi, Nahlah Abdulrahman;
- Yaseen, Fouad A.
- Article
49
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- Salau, Ayodeji Olalekan;
- Beyene, Melesew Mossie
- Article
50
- Applied Sciences (2076-3417), 2017, v. 7, n. 10, p. 1082, doi. 10.3390/app7101082
- Pimenta Rodrigues, Gabriel Arquelau;
- de Oliveira Albuquerque, Robson;
- de Deus, Flávio Elias Gomes;
- de Sousa Jr., Rafael Timóteo;
- de Oliveira Júnior, Gildásio Antônio;
- García Villalba, Luis Javier;
- Tai-Hoon Kim
- Article