Works about COMPUTER network security
Results: 4885
ПОТАЈНИЦИ – ХОНОРАРНИ ПОЛИЦИЈСКИ ДОУШНИЦИ КРАЉЕВИНЕ СРБИЈЕ.
- Published in:
- Istorijski časopis, 2024, n. 73, p. 261, doi. 10.34298/ic2473261j
- By:
- Publication type:
- Article
Modeling intrusion detection systems using swarm intelligence.
- Published in:
- International Journal of Research in Business & Social Science, 2025, v. 14, n. 1, p. 222, doi. 10.20525/ijrbs.v14i1.3582
- By:
- Publication type:
- Article
산업제어 시스템에서의 머신러닝 및 딥러닝 기반 이상탐지.
- Published in:
- Journal of the Korea Institute of Information & Communication Engineering, 2025, v. 29, n. 2, p. 247, doi. 10.6109/jkiice.2025.29.2.247
- By:
- Publication type:
- Article
Bag2image: a multi-instance network traffic representation for network security event prediction.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00292-y
- By:
- Publication type:
- Article
Making a Real-Time IoT Network Intrusion-Detection System (INIDS) Using a Realistic BoT–IoT Dataset with Multiple Machine-Learning Classifiers.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2043, doi. 10.3390/app15042043
- By:
- Publication type:
- Article
Adaptive Semi-Supervised Algorithm for Intrusion Detection and Unknown Attack Identification.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 1709, doi. 10.3390/app15041709
- By:
- Publication type:
- Article
Unmasking the True Identity: Unveiling the Secrets of Virtual Private Networks and Proxies.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 126, doi. 10.3390/info16020126
- By:
- Publication type:
- Article
Segmentation and Filtering Are Still the Gold Standard for Privacy in IoT—An In-Depth STRIDE and LINDDUN Analysis of Smart Homes.
- Published in:
- Future Internet, 2025, v. 17, n. 2, p. 77, doi. 10.3390/fi17020077
- By:
- Publication type:
- Article
PictureGuard: Enhancing Software-Defined Networking–Internet of Things Security with Novel Image-Based Authentication and Artificial Intelligence-Powered Two-Stage Intrusion Detection.
- Published in:
- Technologies (2227-7080), 2025, v. 13, n. 2, p. 55, doi. 10.3390/technologies13020055
- By:
- Publication type:
- Article
Lightweight Authentication Protocol for Smart Grids: An Energy-Efficient Authentication Scheme for Resource-Limited Smart Meters.
- Published in:
- Mathematics (2227-7390), 2025, v. 13, n. 4, p. 580, doi. 10.3390/math13040580
- By:
- Publication type:
- Article
Fine-Grained Encrypted Traffic Classification Using Dual Embedding and Graph Neural Networks.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 778, doi. 10.3390/electronics14040778
- By:
- Publication type:
- Article
Advanced Technologies and Applications in Computer Science and Engineering.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 753, doi. 10.3390/electronics14040753
- By:
- Publication type:
- Article
Security System Design and Verification for Zero Trust Architecture.
- Published in:
- Electronics (2079-9292), 2025, v. 14, n. 4, p. 643, doi. 10.3390/electronics14040643
- By:
- Publication type:
- Article
Mitigation of Risks Associated with Distrustful Routers in OSPF Networks—An Enhanced Method.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 2, p. 43, doi. 10.3390/computers14020043
- By:
- Publication type:
- Article
Ethernet Passive Mutual Authentication Scheme on Quantum Networks.
- Published in:
- Entropy, 2025, v. 27, n. 2, p. 135, doi. 10.3390/e27020135
- By:
- Publication type:
- Article
A demand response-based optimal scheduling framework considering renewable sources and energy storage: a deterministic approach.
- Published in:
- Electrical Engineering, 2025, v. 107, n. 2, p. 1885, doi. 10.1007/s00202-024-02618-y
- By:
- Publication type:
- Article
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting.
- Published in:
- Scientific Data, 2025, v. 12, n. 1, p. 1, doi. 10.1038/s41597-025-04603-x
- By:
- Publication type:
- Article
Construction of Ecological Security Network in Mountainous Transitional Geospace Using Circuit Theory and Morphological Spatial Pattern Analysis: A Case Study of Taihang Mountain Area.
- Published in:
- Sustainability (2071-1050), 2025, v. 17, n. 4, p. 1743, doi. 10.3390/su17041743
- By:
- Publication type:
- Article
Piranha Foraging Optimization Algorithm with Deep Learning Enabled Fault Detection in Blockchain-Assisted Sustainable IoT Environment.
- Published in:
- Sustainability (2071-1050), 2025, v. 17, n. 4, p. 1362, doi. 10.3390/su17041362
- By:
- Publication type:
- Article
A Comparative Study of Incremental and Batch Machine Learning Methodologies for Network Intrusion Detection.
- Published in:
- International Journal of Safety & Security Engineering, 2025, v. 15, n. 1, p. 171, doi. 10.18280/ijsse.150118
- By:
- Publication type:
- Article
Building a Custom Crime Detection Dataset and Implementing a 3D Convolutional Neural Network for Video Analysis.
- Published in:
- Algorithms, 2025, v. 18, n. 2, p. 103, doi. 10.3390/a18020103
- By:
- Publication type:
- Article
Evolution of Bluetooth Technology: BLE in the IoT Ecosystem.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 996, doi. 10.3390/s25040996
- By:
- Publication type:
- Article
MTL-DoHTA: Multi-Task Learning-Based DNS over HTTPS Traffic Analysis for Enhanced Network Security.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 4, p. 993, doi. 10.3390/s25040993
- By:
- Publication type:
- Article
Stackelberg Security Games with Contagious Attacks on a Network: Reallocation to the Rescue.
- Published in:
- Journal of Artificial Intelligence Research, 2023, v. 77, p. 487, doi. 10.1613/jair.1.14563
- By:
- Publication type:
- Article
CYBER OPERATIONS AND THE JUS AD BELLUM REVISITED.
- Published in:
- Villanova Law Review, 2011, v. 56, n. 3, p. 569
- By:
- Publication type:
- Article
Multiobjective Decision Support in IT-Risk Management.
- Published in:
- International Journal of Information Technology & Decision Making, 2002, v. 1, n. 2, p. 251, doi. 10.1142/S0219622002000154
- By:
- Publication type:
- Article
Stopping Cyberattacks: Strategies for Dental Office Data Security.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2021, v. 42, n. 1, p. 11
- By:
- Publication type:
- Article
Fuzzy K-Means with M-KMP: a security framework in pyspark environment for intrusion detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 30, p. 73841, doi. 10.1007/s11042-024-18180-5
- By:
- Publication type:
- Article
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection System.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 21, p. 59887, doi. 10.1007/s11042-023-17886-2
- By:
- Publication type:
- Article
Chaotic coyote optimization algorithm for image encryption and steganography.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 7, p. 20861, doi. 10.1007/s11042-023-16240-w
- By:
- Publication type:
- Article
An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 15, p. 23615, doi. 10.1007/s11042-023-14795-2
- By:
- Publication type:
- Article
MOAEOSCA: an enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 9, p. 13369, doi. 10.1007/s11042-022-13836-6
- By:
- Publication type:
- Article
Comparative analysis of CN2 rule induction with other classification algorithms for network security.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 26, p. 37119, doi. 10.1007/s11042-022-13542-3
- By:
- Publication type:
- Article
Speech encryption using hybrid-hyper chaotic system and binary masking technique.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 6331, doi. 10.1007/s11042-021-11757-4
- By:
- Publication type:
- Article
Network data security sharing system based on blockchain.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 21-23, p. 31887, doi. 10.1007/s11042-021-11183-6
- By:
- Publication type:
- Article
Is Cybersecurity a Public Good?
- Published in:
- 2019
- By:
- Publication type:
- Editorial
ONLINE SIGNATURE VERIFICATION BY COMBINING SHAPE CONTEXTS AND LOCAL FEATURES.
- Published in:
- International Journal of Image & Graphics, 2006, v. 6, n. 3, p. 407, doi. 10.1142/S0219467806002318
- By:
- Publication type:
- Article
DESIGN REVIEW IN A DISTRIBUTED COLLABORATIVE VIRTUAL ENVIRONMENT.
- Published in:
- International Journal of Image & Graphics, 2006, v. 6, n. 1, p. 45, doi. 10.1142/S021946780600215X
- By:
- Publication type:
- Article
MODEL-BASED METHODS FOR STEGANOGRAPHY AND STEGANALYSIS.
- Published in:
- International Journal of Image & Graphics, 2005, v. 5, n. 1, p. 167, doi. 10.1142/S0219467805001719
- By:
- Publication type:
- Article
Securing Vehicle Communication Systems by the KLJN Key Exchange Protocol.
- Published in:
- Fluctuation & Noise Letters, 2014, v. 13, n. 3, p. -1, doi. 10.1142/S0219477514500205
- By:
- Publication type:
- Article
REMARK ON A "NON-BREAKABLE DATA ENCRYPTION" SCHEME BY KISH AND SETHURAMAN.
- Published in:
- Fluctuation & Noise Letters, 2004, v. 4, n. 4, p. C25, doi. 10.1142/S0219477504002324
- By:
- Publication type:
- Article
RESPONSE TO KLAPPENECKER'S REMARK ON A NON-BREAKABLE DATA ENCRYPTION SCHEME BY KISH AND SETHURAMAN.
- Published in:
- Fluctuation & Noise Letters, 2004, v. 4, n. 4, p. C27, doi. 10.1142/S0219477504002336
- By:
- Publication type:
- Article
Implementing Cryptographic Techniques in Storage Area Network with respect to QoS.
- Published in:
- Amity Journal of Computational Sciences, 2022, v. 6, n. 1, p. 1
- By:
- Publication type:
- Article
IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) USING SECURITY ONION.
- Published in:
- Journal of Syntax Literate, 2022, v. 7, n. 10, p. 14947
- By:
- Publication type:
- Article
Local Migrants, Insurgency and Farmer’s Conflict in Benue State, Nigeria, 2015-2017.
- Published in:
- African Journal of Terrorism & Insurgency Research (AJoTIR), 2021, v. 2, n. 3, p. 31, doi. 10.31920/2732-5008/2021/v2n3a2
- By:
- Publication type:
- Article
An unsupervised approach for the detection of zero‐day distributed denial of service attacks in Internet of Things networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 513, doi. 10.1049/ntw2.12134
- By:
- Publication type:
- Article
Meta‐analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 5, p. 339, doi. 10.1049/ntw2.12128
- By:
- Publication type:
- Article
A PU‐learning based approach for cross‐site scripting attacking reality detection.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 4, p. 313, doi. 10.1049/ntw2.12123
- By:
- Publication type:
- Article
FUBA: A fuzzy‐based unmanned aerial vehicle behaviour analytics for trust management in flying ad‐hoc networks.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 3, p. 208, doi. 10.1049/ntw2.12108
- By:
- Publication type:
- Article
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures.
- Published in:
- IET Networks (Wiley-Blackwell), 2024, v. 13, n. 2, p. 129, doi. 10.1049/ntw2.12113
- By:
- Publication type:
- Article