Results 41 to 45 of about 7,289,226 (45)
Some of the next articles are maybe not open access.

Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy

Network and Distributed System Security Symposium, 2016
—There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has ...
Jakub Czyz   +3 more
semanticscholar   +1 more source

Cloud Belief Rule Base Model for Network Security Situation Prediction

IEEE Communications Letters, 2016
To predict network security situations better using expert knowledge and quantitative data, a new forecasting model known as cloud belief rule base (CBRB) model is proposed.
Guanyu Hu, Pei-Li Qiao
semanticscholar   +1 more source

Network Security

Implementing Information Security in Healthcare, 2020
Buddy Gilbert
semanticscholar   +1 more source

Social network security: Issues, challenges, threats, and solutions

Information Sciences, 2017
S. Rathore   +4 more
semanticscholar   +1 more source

A taxonomy for attack graph generation and usage in network security

Journal of Information Security and Applications, 2016
Kerem Kaynar
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy