Suggested Topics within your search.
Suggested Topics within your search.
Network security
82
QA75 Electronic computers. Computer science
79
TK Electrical engineering. Electronics Nuclear engineering
54
Internet of things
35
Security
23
Blockchain
22
Deep learning
20
Security systems
20
security
20
Authentication
19
article
19
Convolutional neural networks
18
Cybersecurity
18
Block-chain
17
QA76 Computer software
17
deep learning
17
Artificial intelligence
16
Computer networking & communications
16
Cryptography
15
machine learning
15
Convolution
14
Cyber security
14
Digital storage
14
Electric power transmission networks
14
human
14
Machine learning
13
Cloud computing
12
Computer security
12
Convolutional neural network
12
Information management
11
-
41
-
42
-
43by Emil BURTESCU“... are obvious. But the construction and the existence of a network without meeting some minimum security...”
Published 2006-01-01
Get full text
Article -
44
-
45by Jones, Francis B.“...Human factors, such as ethics and education, are important factors in network information security...”
Published 2014
Get full text
-
46by Brown, Thomas L.“... security tools, to support Unix networks. The toolbox can be used to enhance system security, automating...”
Published 2014
Get full text
-
47by Cheng, C. S.“... from the network equipment offers greatest flexibility for the implementation of secure control...”
Published 2001
Get full text
-
48“...碩士 === 國立嘉義大學 === 資訊工程學系研究所 === 99 === IP security protocol (IPsec) has been implemented widely...”
Get full text
Others -
49by Fuloria, ShailendraSubjects: “...Electric power systems--Security measures...”
Published 2012
Get full text
-
50“... === This paper develops a Security Architecture for a network of telemetry networks as is envisioned for future...”
Get full text
-
51
-
52“... in the system. An Amoeba Network Security System (ANSS) is then built based on the design schemes...”
Get full text
Others -
53“... and higher. However, the network itself has the shortage of security and is often attacked and intruded...”
Get full text
Others -
54by Pepakayala, Sagar“... the blackhat community day by day, honeypots could be an effective weapon in the network security administrator...”
Published 2007
Get full text
Others -
55by Soewito, Benfano“..., availability, and integrity for diverse system connected through them. If network security system could...”
Published 2009
Get full text
Get full text
Others -
56by Chen, Cheng, S.M. Massachusetts Institute of Technology“... (pages 43-44). === In this thesis, we study the security of a block cipher design called substitution...”
Published 2016
Get full text
Others -
57by EVALDO GONCALVES PELAES“.... Three security protocols are then proposed for interactive and one-way communication in packet...”
Published 1982
Get full text
Get full text
-
58by Paul, Greig“... encountered in implementing a secure decentralised network, based around storage, and presents solutions...”
Published 2017
Get full text
-
59“... that, network attacking is composite by multiple steps of attacks. The attacker should consider and combine...”
Get full text
Others -
60by Cai, Songlin“...This dissertation studies several security issues in data networks, to reveal the vulnerability...”
Published 2005
Get full text