Works matching DE "DEEP packet inspection (Computer security)"
1
- Journal of Artificial Intelligence (2579-0021), 2022, v. 4, n. 3, p. 133, doi. 10.32604/jai.2022.031800
- Jie Luo;
- Qingbing Ji;
- Lvlin Ni
- Article
2
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142184
- Altaha, Mustafa;
- Hong, Sugwon
- Article
3
- Electronics (2079-9292), 2021, v. 10, n. 12, p. 1376, doi. 10.3390/electronics10121376
- Huang, Yung-Fa;
- Lin, Chuan-Bi;
- Chung, Chien-Min;
- Chen, Ching-Mu
- Article
4
- Electronics (2079-9292), 2021, v. 10, n. 1, p. 27, doi. 10.3390/electronics10010027
- Mun, Hyunsu;
- Lee, Youngseok
- Article
5
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- Kim, So-Yeon;
- Yun, Sun-Woo;
- Lee, Eun-Young;
- Bae, So-Hyeon;
- Lee, Il-Gu
- Article
6
- Governance, 2019, v. 32, n. 1, p. 103, doi. 10.1111/gove.12353
- Ball, Kirstie;
- Degli Esposti, Sara;
- Dibb, Sally;
- Pavone, Vincenzo;
- Santiago‐Gomez, Elvira
- Article
7
- Information Security Journal: A Global Perspective, 2017, v. 26, n. 4, p. 153, doi. 10.1080/19393555.2017.1328544
- K, Anusha;
- E, Sathiyamoorthy
- Article
8
- International Arab Journal of Information Technology (IAJIT), 2017, v. 14, n. 3, p. 362
- Yongfeng Cui;
- Shi Dong;
- Wei Liu
- Article
9
- Multimedia Tools & Applications, 2024, v. 83, n. 40, p. 87903, doi. 10.1007/s11042-024-18845-1
- Article
10
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 908, doi. 10.3969/j.issn.1001-3695.2014.03.065
- Article
11
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-70983-6
- Salau, Ayodeji Olalekan;
- Beyene, Melesew Mossie
- Article
12
- Mobile Networks & Applications, 2024, v. 29, n. 6, p. 2004, doi. 10.1007/s11036-024-02321-z
- Chiang, Wei-Kuo;
- Li, Tsung-Ying
- Article
13
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1779, doi. 10.1007/s11036-022-02000-x
- Liu, Qiang;
- Shea, Ryan;
- Liu, Zhi;
- Wang, Zehua;
- Hu, Han
- Article
14
- Mobile Networks & Applications, 2022, v. 27, n. 5, p. 1867, doi. 10.1007/s11036-019-01402-8
- Deng, Jun;
- Cai, He;
- Chen, Sheng;
- Ren, Jianji;
- Wang, Xiaofei
- Article
15
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 24, p. 13391, doi. 10.1007/s00500-022-07450-9
- Cui, Susu;
- Liu, Jian;
- Dong, Cong;
- Lu, Zhigang;
- Du, Dan
- Article
16
- Future Internet, 2024, v. 16, n. 12, p. 470, doi. 10.3390/fi16120470
- Kenyon, Anthony;
- Deka, Lipika;
- Elizondo, David
- Article
17
- Journal of Digital Forensics, Security & Law, 2014, v. 9, n. 2, p. 23
- Breitinger, Frank;
- Baggili, Ibrahim
- Article
18
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 2, p. 424, doi. 10.1007/s12083-015-0350-2
- Qin, Tao;
- Wang, Lei;
- Zhao, Dan;
- Zhu, Min
- Article
19
- Journal of Information Science & Engineering, 2014, v. 30, n. 5, p. 1395
- Article
20
- Journal of Information Science & Engineering, 2014, v. 30, n. 3, p. 819
- HANSOON KIM;
- YOUNGLOK KIM;
- JU WOOK JANG
- Article
21
- Applied Sciences (2076-3417), 2023, v. 13, n. 14, p. 8104, doi. 10.3390/app13148104
- Çelebi, Merve;
- Yavanoğlu, Uraz
- Article
22
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7937, doi. 10.3390/app12157937
- Chen, Yongxin;
- Wang, Yongjun;
- Yang, Luming
- Article
23
- Applied Sciences (2076-3417), 2017, v. 7, n. 10, p. 1082, doi. 10.3390/app7101082
- Pimenta Rodrigues, Gabriel Arquelau;
- de Oliveira Albuquerque, Robson;
- de Deus, Flávio Elias Gomes;
- de Sousa Jr., Rafael Timóteo;
- de Oliveira Júnior, Gildásio Antônio;
- García Villalba, Luis Javier;
- Tai-Hoon Kim
- Article
24
- International Journal of Network Management, 2025, v. 35, n. 1, p. 1, doi. 10.1002/nem.2307
- Bringhenti, Daniele;
- Pizzato, Francesco;
- Sisto, Riccardo;
- Valenza, Fulvio
- Article
25
- International Journal of Network Management, 2021, v. 31, n. 5, p. 1, doi. 10.1002/nem.2151
- Rosário, Denis;
- Villas, Leandro A.
- Article
26
- International Journal of Network Management, 2021, v. 31, n. 4, p. 1, doi. 10.1002/nem.2147
- Arfeen, Asad;
- Ul Haq, Khizar;
- Yasir, Syed Muhammad
- Article
27
- International Journal of Network Management, 2015, v. 25, n. 6, p. 490, doi. 10.1002/nem.1920
- Bouet, Mathieu;
- Leguay, Jérémie;
- Combe, Théo;
- Conan, Vania
- Article
28
- Serbian Journal of Electrical Engineering, 2021, v. 18, n. 2, p. 237, doi. 10.2298/SJEE2102237I
- Ilievski, Gjorgji;
- Latkoski, Pero
- Article
29
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 8, p. 3804, doi. 10.3837/tiis.2018.08.014
- Dubin, Ran;
- Hadar, Ofer;
- Dvir, Amit;
- Pele, Ofir
- Article
30
- Enterprise Information Systems, 2017, v. 11, n. 9, p. 1317, doi. 10.1080/17517575.2016.1234070
- Tseng, Kuo-Kun;
- Lo, Jiao;
- Liu, Yiming;
- Chang, Shih-Hao;
- Merabti, Madjid;
- Ng, Felix, C. K.;
- Wu, C. H.
- Article
31
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 4, p. 794, doi. 10.3390/jcp4040037
- Foreman, Justin;
- Waters, Willie L.;
- Kamhoua, Charles A.;
- Hemida, Ahmed H. Anwar;
- Acosta, Jaime C.;
- Dike, Blessing C.
- Article
32
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/5523834
- Chu, Xiaolu;
- Cheng, Ke;
- Song, Anxiao;
- Fu, Jiaxuan;
- C., Puttamadappa
- Article
33
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 381, doi. 10.1049/iet-ifs.2017.0421
- Ho, ThienLuan;
- Cho, Seong‐Je;
- Oh, Seung‐Rohk
- Article
34
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 104, doi. 10.1049/iet-ifs.2015.0246
- Trabelsi, Zouheir;
- Zeidan, Safaa;
- Masud, Mohammad M.
- Article
35
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 4, p. 327, doi. 10.1049/iet-ifs.2012.0340
- Cronin, Brendan;
- Wang, Xiaojun
- Article
36
- Duzce University Journal of Science & Technology, 2023, v. 11, n. 3, p. 1546, doi. 10.29130/dubited.1131544
- ÇELEBİ, Merve;
- YAVANOĞLU, Uraz
- Article
38
- Mülkiye Dergisi, 2013, v. 37, n. 3, p. 37
- Aydın, Duygu Hatipoğlu;
- Ceyhan, Çağdaş;
- Aydın, Mustafa Berkay
- Article
39
- Journal of Computer Networks & Communications, 2023, p. 1, doi. 10.1155/2023/1495642
- Wassie Geremew, Getahun;
- Ding, Jianguo
- Article
40
- Neural Computing & Applications, 2025, v. 37, n. 8, p. 5991, doi. 10.1007/s00521-024-10967-9
- Rahim, Kashif;
- Nasir, Zia Ul Islam;
- Ikram, Nassar;
- Qureshi, Hassaan Khaliq
- Article
41
- Journal of Cyber Security Technology, 2022, v. 6, n. 1/2, p. 27, doi. 10.1080/23742917.2022.2058836
- Esseghir, Amir;
- Kamoun, Faouzi;
- Hraiech, Oussema
- Article
42
- African Journal of Science, Technology, Innovation & Development, 2022, v. 14, n. 2, p. 556, doi. 10.1080/20421338.2020.1866147
- Dairo, Adeolu;
- Szűcs, Krisztián
- Article
43
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 3, p. 853, doi. 10.18280/ijsse.140317
- Dhumane, Amol;
- Sakhare, Nitin N.;
- Dehankar, Pooja;
- Kumar, Jambi Ratna Raja;
- Patil, Sheetal S.;
- Tatiya, Manjusha
- Article
44
- PLoS ONE, 2018, v. 13, n. 10, p. 1, doi. 10.1371/journal.pone.0206068
- Xu, Chengcheng;
- Su, Jinshu;
- Chen, Shuhui
- Article
45
- Intelligent Automation & Soft Computing, 2022, v. 31, n. 3, p. 1345, doi. 10.32604/iasc.2022.020801
- Mubarak, Sinil;
- Habaebi, Mohamed Hadi;
- Islam, Md Rafiqul;
- Balla, Asaad;
- Tahir, Mohammad;
- Elsheikh, Elfatih A. A.;
- Suliman, F. M.
- Article
46
- Ohio State Law Journal, 2013, v. 74, n. 6, p. 1195
- MARGONI, THOMAS;
- PERRY, MARK
- Article
47
- Wireless Personal Communications, 2022, v. 127, n. 1, p. 217, doi. 10.1007/s11277-021-08208-6
- Kumar, Sathish A. P.;
- Suresh, A.;
- Anand, S. Raj;
- Chokkanathan, K.;
- Vijayasarathy, M.
- Article
48
- Wireless Personal Communications, 2022, v. 125, n. 1, p. 1, doi. 10.1007/s11277-022-09538-9
- Choudhary, Deepak;
- Pahuja, Roop
- Article
49
- Wireless Personal Communications, 2020, v. 115, n. 2, p. 993, doi. 10.1007/s11277-020-07608-4
- Praise, J. Jeya;
- Raj, R. Joshua Samuel;
- Benifa, J. V. Bibal
- Article
50
- International Journal of Computer Science & Management Studies, 2014, v. 14, n. 10, p. 1
- Prabha, Rama;
- Jayanthi R., K. P.
- Article