Results 311 to 320 of about 4,301,094 (348)
Some of the next articles are maybe not open access.
Applications of artificial immune systems to computer security: A survey
Journal of Information Security and Applications, 2017Diogo A. B. Fernandes+3 more
semanticscholar +1 more source
Computer Network Security Protocols
2008The rapid growth of the Internet and corresponding Internet community has fueled a rapid growth of both individual and business communications leading to the growth of e-mail and e-commerce. In fact, studies now show that the majority of the Internet communication content is e-mail content.
openaire +2 more sources
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Bo-chao Cheng+2 more
exaly
Handbook of Computer Networks and Cyber Security: Principles and Paradigms
Handbook of Computer Networks and Cyber Security, 2020B. Gupta+3 more
semanticscholar +1 more source
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
IEEE Communications Surveys and Tutorials, 2020Abdulla Al-ali, Amr Mohamed, Ihsan Ali
exaly
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Hongzhi Guo, Jingyi Li, Jiajia Liu
exaly
Measuring Risk: Computer Security Metrics, Automation, and Learning
IEEE Annals of the History of Computing, 2015R. Slayton
semanticscholar +1 more source
Machine Learning in IoT Security: Current Solutions and Future Challenges
IEEE Communications Surveys and Tutorials, 2020Ekram Hossain+2 more
exaly
A Survey on Metaverse: Fundamentals, Security, and Privacy
IEEE Communications Surveys and Tutorials, 2023Yuntao Wang, Zhou Su, Xiaofeng Tao
exaly