Results 1 to 10 of about 7,289,226 (45)

Automation for Network Security Configuration: State of the Art and Research Trends

open access: yesACM Computing Surveys, 2023
The size and complexity of modern computer networks are progressively increasing, as a consequence of novel architectural paradigms such as the Internet of Things and network virtualization.
Daniele Bringhenti   +3 more
semanticscholar   +1 more source

FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications

open access: yesNetwork and Distributed System Security Symposium, 2021
—An emerging trend in network security consists in the adoption of programmable switches for performing various security tasks in large-scale, high-speed networks. However, since existing solutions are tailored to specific tasks, they cannot accommodate a
Diogo Barradas   +5 more
semanticscholar   +1 more source

Research on Network Security Situational Awareness Based on Crawler Algorithm

open access: yesSecurity and Communication Networks, 2022
Network security situation awareness is a critical basis for security solutions because it displays the target system’s security state by assessing actual or possible cyber-attacks in the target system.
Xu Wu   +5 more
semanticscholar   +1 more source

A Review of Computer Vision Methods in Network Security [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2020
Network security has become an area of significant importance more than ever as highlighted by the eye-opening numbers of data breaches, attacks on critical infrastructure, and malware/ransomware/cryptojacker attacks that are reported almost every day ...
Jiawei Zhao   +2 more
semanticscholar   +1 more source

Network Security

open access: yesNTT technical review, 2022
their reoccurrence.
Takashi Mishina   +3 more
semanticscholar   +1 more source

A Survey of Moving Target Defenses for Network Security [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2019
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to account for the attacker’s inherent advantage present due to the static nature of network services and configurations.
Sailik Sengupta   +5 more
semanticscholar   +1 more source

Rallying Adversarial Techniques against Deep Learning for Network Security [PDF]

open access: yesIEEE Symposium Series on Computational Intelligence, 2019
Recent advances in artificial intelligence and the increasing need for robust defensive measures in network security have led to the adoption of deep learning approaches for network intrusion detection systems (NIDS). These methods have achieved superior
Joseph Clements   +4 more
semanticscholar   +1 more source

An intelligent agriculture network security system based on private blockchains

open access: yesJournal of Communications and Networks, 2019
Countries around the world are nowadays actively promoting development in intelligent agriculture. Each of them must develop a specific plan tailored to environmental farming indices of each individual farm, and such information would be both important ...
Hsin-Te Wu, Chun-Wei Tsai
semanticscholar   +1 more source

Analysis framework of network security situational awareness and comparison of implementation methods

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
Information technology has penetrated into all aspects of politics, economy, and culture of the whole society. The information revolution has changed the way of communication all over the world, promoted the giant development of human society, and also ...
Yan Li   +3 more
semanticscholar   +1 more source

Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

open access: yesPLoS ONE, 2016
A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from ...
Min-Joo Kang, Je-Won Kang
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy