Results 41 to 45 of about 7,289,226 (45)
Some of the next articles are maybe not open access.
Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy
Network and Distributed System Security Symposium, 2016—There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has ...
Jakub Czyz+3 more
semanticscholar +1 more source
Cloud Belief Rule Base Model for Network Security Situation Prediction
IEEE Communications Letters, 2016To predict network security situations better using expert knowledge and quantitative data, a new forecasting model known as cloud belief rule base (CBRB) model is proposed.
Guanyu Hu, Pei-Li Qiao
semanticscholar +1 more source
Social network security: Issues, challenges, threats, and solutions
Information Sciences, 2017S. Rathore+4 more
semanticscholar +1 more source
A taxonomy for attack graph generation and usage in network security
Journal of Information Security and Applications, 2016Kerem Kaynar
semanticscholar +1 more source