Results 311 to 320 of about 9,492,518 (363)
Some of the next articles are maybe not open access.

Cryptography And Network Security

INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
-Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Krisha Patel
semanticscholar   +1 more source

A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy

IEEE transactions on intelligent transportation systems (Print), 2019
Vehicular ad hoc networks (VANETs) are becoming the most promising research topic in intelligent transportation systems, because they provide information to deliver comfort and safety to both drivers and passengers.
Zhaojun Lu, G. Qu, Zhenglin Liu
semanticscholar   +1 more source

Network Security

Understanding Cybersecurity Technologies, 2021
Abbas Moallem
openaire   +2 more sources

Securing ATM networks

Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96, 1996
In this paper we identify and address the challenges unique to providing a secure ATM network. We analyse the network environment and consider the correct placement of security mechanisms, with particular attention to data transfer protection, in such an environment. We then introduce and describe a key agile cryptographic device for ATM networks.
openaire   +1 more source

Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns

IEEE Transactions on Services Computing, 2019
Network functions virtualization intertwined with software-defined networking opens up great opportunities for flexible provisioning and composition of network functions, known as network service chaining.
Alireza Shameli-Sendi   +3 more
semanticscholar   +1 more source

The Threat of Adversarial Attacks against Machine Learning in Network Security: A Survey

Journal of Electronics and Electrical Engineering, 2019
Machine learning models have made many decision support systems to be faster, more accurate and more efficient. However, applications of machine learning in network security face more disproportionate threat of active adversarial attacks compared to ...
Olakunle Ibitoye   +4 more
semanticscholar   +1 more source

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF

Frontiers of Information Technology & Electronic Engineering, 2019
By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention.
Yalan Qin   +5 more
semanticscholar   +1 more source

Towards In-Network Security for Smart Homes

ARES, 2018
The proliferation of the Internet of Things (IoT) in the context of smart homes entails new security risks threatening the privacy and safety of end users.
Martin Serror   +4 more
semanticscholar   +1 more source

A review on graph-based approaches for network security monitoring and botnet detection

International Journal of Information Security, 2023
S. Lagraa   +5 more
semanticscholar   +1 more source

Secure Network Objects

Proceedings 1996 IEEE Symposium on Security and Privacy, 1999
L. Van Doorn   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy