Results 11 to 20 of about 7,289,226 (45)

A Survey on Network Security-Related Data Collection Technologies

open access: yesIEEE Access, 2018
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats.
Huaqing Lin   +3 more
semanticscholar   +1 more source

LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey

open access: yesIEEE Access, 2018
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency than legacy cellular networks.
Limei He   +2 more
semanticscholar   +1 more source

Application of Data Encryption Technology in Computer Network Security

open access: yesJournal of Physics: Conference Series, 2019
With the development of information technology, the problem of computer network security is becoming more and more prominent. Illegal invasion, information disclosure, virus impact and network vulnerability are all factors that affect computer network ...
Weilian. Chu
semanticscholar   +1 more source

Framework for Interface to Network Security Functions

open access: yesRequest for Comments, 2018
This document describes the framework for Interface to Network Security Functions (I2NSF) and defines a reference model (including major functional components) for I2NSF.
Diego R. López   +4 more
semanticscholar   +1 more source

Standardizing IoT Network Security Policy Enforcement

open access: yes, 2018
This paper discusses the design of a standardized network security policy enforcement architecture for IoT devices. We show that the network behavior of many consumer IoT devices tends to be predictable, and thus simple to profile and constrain.
David Barrera, Ian Molloy, Heqing Huang
semanticscholar   +1 more source

Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things

open access: yesIEEE Access, 2017
Internet of Things (IoT) brings the third development wave of the global information industry, which makes users, network, and perception devices cooperate more closely.
Guangquan Xu   +4 more
semanticscholar   +1 more source

Network Security and Privacy Challenges in Smart Vehicle-to-Grid

open access: yesIEEE wireless communications, 2017
Smart vehicle-to-grid (V2G) involves intelligent charge and discharge decisions based on user operational energy requirements, such as desired levels of charging and waiting time.
N. Saxena   +3 more
semanticscholar   +1 more source

A Survey on Network Security Monitoring Systems

open access: yes2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2016
Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks.
Ibrahim Ghafir   +3 more
semanticscholar   +1 more source

Survey of Network Security Situation Awareness

open access: yesInternational Conference on Crowd Science and Engineering, 2017
: With the increasing significance of network space security continues, the research and application of network security situation awareness has gained more and more attention. In this paper, it described the development as well as the concept of network
Changlin He, Yufen Li
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy