Results 301 to 310 of about 9,492,518 (363)
Some of the next articles are maybe not open access.
A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G
IEEE Communications Surveys and Tutorials, 2022Space-air-ground-sea integrated network (SAGSIN), which integrates satellite communication networks, aerial networks, terrestrial networks, and marine communication networks, has been widely envisioned as a promising network architecture for 6G.
Hongzhi Guo +4 more
semanticscholar +1 more source
AI/ML for Network Security: The Emperor has no Clothes
Conference on Computer and Communications Security, 2022Several recent research efforts have proposed Machine Learning (ML)-based solutions that can detect complex patterns in network traffic for a wide range of network security problems.
A. Jacobs +5 more
semanticscholar +1 more source
This project is due on Tuesday, October 17 at 10 p.m.. You must work in teams of two and submit one project per team. You will have a budget of five late days (24-hour periods) over the course of the semester that you can use to turn assignments in late ...
Krishna Maan, Ajit Kumar
semanticscholar +3 more sources
A Firewall Policy Anomaly Detection Framework for Reliable Network Security
IEEE Transactions on Reliability, 2021One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls.
Cengiz Toğay +3 more
semanticscholar +1 more source
The Journal of medical practice management : MPM, 2006
As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world.
+6 more sources
As you can see, there are a number of different ways to protect your network with different protocols, all of which can be very confusing to people whose core business process is not technology. This article is only a brief synopsis of the dangers that lurk in the corners of the technology world.
+6 more sources
Network security (security in large networks)
Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2002It is common that users or hosts in a large network are partitioned and organized as a hierarchical free where children of the same parent from a group. Secure broadcasting intends to provide a secure communication channel from a sending principal to a group of legal receiving principals.
M. Singh, S. Singh
openaire +1 more source
2010
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.
Tansu Alpcan, Tamer Başar
+5 more sources
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems.
Tansu Alpcan, Tamer Başar
+5 more sources
Security and Privacy on 6G Network Edge: A Survey
IEEE Communications Surveys and Tutorials, 2023To meet the stringent service requirements of 6G applications such as immersive cloud eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that an increasing number of servers will be deployed on the network edge.
Bomin Mao, Jiajia Liu, Y. Wu, Nei Kato
semanticscholar +1 more source
2018
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc
Mamata Rath +3 more
+4 more sources
This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc
Mamata Rath +3 more
+4 more sources
Network security risk assessment model based on fuzzy theory
Journal of Intelligent & Fuzzy Systems, 2020With the rapid development of information science and technology, network security has occupied a very important position in people’s lives. Since the network security situation problem does not form a unified optimal solution in the model and algorithm,
Bo Yi, Yuanping Cao, Ying Song
semanticscholar +1 more source

