Results 11 to 20 of about 7,289,226 (45)
A Survey on Network Security-Related Data Collection Technologies
Security threats and economic loss caused by network attacks, intrusions, and vulnerabilities have motivated intensive studies on network security. Normally, data collected in a network system can reflect or can be used to detect security threats.
Huaqing Lin+3 more
semanticscholar +1 more source
LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey
The long-term evolution (LTE)/LTE-advanced (LTE-A) network provides advanced services for billions of users with its higher bandwidths, better spectrum efficiency, and lower latency than legacy cellular networks.
Limei He+2 more
semanticscholar +1 more source
Application of Data Encryption Technology in Computer Network Security
With the development of information technology, the problem of computer network security is becoming more and more prominent. Illegal invasion, information disclosure, virus impact and network vulnerability are all factors that affect computer network ...
Weilian. Chu
semanticscholar +1 more source
Framework for Interface to Network Security Functions
This document describes the framework for Interface to Network Security Functions (I2NSF) and defines a reference model (including major functional components) for I2NSF.
Diego R. López+4 more
semanticscholar +1 more source
Standardizing IoT Network Security Policy Enforcement
This paper discusses the design of a standardized network security policy enforcement architecture for IoT devices. We show that the network behavior of many consumer IoT devices tends to be predictable, and thus simple to profile and constrain.
David Barrera, Ian Molloy, Heqing Huang
semanticscholar +1 more source
Internet of Things (IoT) brings the third development wave of the global information industry, which makes users, network, and perception devices cooperate more closely.
Guangquan Xu+4 more
semanticscholar +1 more source
Network Security and Privacy Challenges in Smart Vehicle-to-Grid
Smart vehicle-to-grid (V2G) involves intelligent charge and discharge decisions based on user operational energy requirements, such as desired levels of charging and waiting time.
N. Saxena+3 more
semanticscholar +1 more source
A Survey on Network Security Monitoring Systems
Network monitoring is a difficult and demanding task that is a vital part of a network administrator's job. Network administrators are constantly striving to maintain smooth operation of their networks.
Ibrahim Ghafir+3 more
semanticscholar +1 more source
Survey of Network Security Situation Awareness
: With the increasing significance of network space security continues, the research and application of network security situation awareness has gained more and more attention. In this paper, it described the development as well as the concept of network
Changlin He, Yufen Li
semanticscholar +1 more source
Guide to Computer Network Security, 6th Edition
J. M. Kizza
semanticscholar +1 more source