Results 311 to 320 of about 9,492,518 (363)
Some of the next articles are maybe not open access.
Cryptography And Network Security
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT-Cryptography and network security are foundational domains in the field of information technology and cybersecurity. As digital communication continues to expand, protecting data from unauthorized access, tampering, and interception is paramount.
Krisha Patel
semanticscholar +1 more source
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
IEEE transactions on intelligent transportation systems (Print), 2019Vehicular ad hoc networks (VANETs) are becoming the most promising research topic in intelligent transportation systems, because they provide information to deliver comfort and safety to both drivers and passengers.
Zhaojun Lu, G. Qu, Zhenglin Liu
semanticscholar +1 more source
Proceedings of the 3rd ACM conference on Computer and communications security - CCS '96, 1996
In this paper we identify and address the challenges unique to providing a secure ATM network. We analyse the network environment and consider the correct placement of security mechanisms, with particular attention to data transfer protection, in such an environment. We then introduce and describe a key agile cryptographic device for ATM networks.
openaire +1 more source
In this paper we identify and address the challenges unique to providing a secure ATM network. We analyse the network environment and consider the correct placement of security mechanisms, with particular attention to data transfer protection, in such an environment. We then introduce and describe a key agile cryptographic device for ATM networks.
openaire +1 more source
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns
IEEE Transactions on Services Computing, 2019Network functions virtualization intertwined with software-defined networking opens up great opportunities for flexible provisioning and composition of network functions, known as network service chaining.
Alireza Shameli-Sendi +3 more
semanticscholar +1 more source
The Threat of Adversarial Attacks against Machine Learning in Network Security: A Survey
Journal of Electronics and Electrical Engineering, 2019Machine learning models have made many decision support systems to be faster, more accurate and more efficient. However, applications of machine learning in network security face more disproportionate threat of active adversarial attacks compared to ...
Olakunle Ibitoye +4 more
semanticscholar +1 more source
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Frontiers of Information Technology & Electronic Engineering, 2019By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention.
Yalan Qin +5 more
semanticscholar +1 more source
Towards In-Network Security for Smart Homes
ARES, 2018The proliferation of the Internet of Things (IoT) in the context of smart homes entails new security risks threatening the privacy and safety of end users.
Martin Serror +4 more
semanticscholar +1 more source
A review on graph-based approaches for network security monitoring and botnet detection
International Journal of Information Security, 2023S. Lagraa +5 more
semanticscholar +1 more source
Proceedings 1996 IEEE Symposium on Security and Privacy, 1999
L. Van Doorn +3 more
openaire +1 more source
L. Van Doorn +3 more
openaire +1 more source

