skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 21 - 40 of 41,825  for All Library Resources

previous page 1 Results 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
21
Design and Implementation of Power Network Security Protection System Based on Internet of Things
Material Type:
Article
Add to My Research

Design and Implementation of Power Network Security Protection System Based on Internet of Things

Journal of physics. Conference series, 2022-01, Vol.2146 (1), p.12011 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2146/1/012011

Full text available

22
Benchmarking NetBASILISK: a Network Security Project for Science
Material Type:
Article
Add to My Research

Benchmarking NetBASILISK: a Network Security Project for Science

EPJ Web of Conferences, 2021, Vol.251, p.2068 [Peer Reviewed Journal]

2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2100-014X ;ISSN: 2101-6275 ;EISSN: 2100-014X ;DOI: 10.1051/epjconf/202125102068

Full text available

23
MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORY
Material Type:
Article
Add to My Research

MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORY

Technological and economic development of economy, 2022-03, Vol.28 (3), p.638-654 [Peer Reviewed Journal]

2022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2029-4913 ;EISSN: 2029-4921 ;DOI: 10.3846/tede.2022.16483

Full text available

24
Some Certiticateless Short Signature Schemes of Security Analysis and Simple Improvement
Material Type:
Article
Add to My Research

Some Certiticateless Short Signature Schemes of Security Analysis and Simple Improvement

Journal of physics. Conference series, 2020-11, Vol.1673 (1), p.12050 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1673/1/012050

Full text available

25
Key management scheme of distributed IoT devices based on blockchains
Material Type:
Article
Add to My Research

Key management scheme of distributed IoT devices based on blockchains

IET communications, 2023-07, Vol.17 (12), p.1409-1417 [Peer Reviewed Journal]

2023 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8628 ;EISSN: 1751-8636 ;DOI: 10.1049/cmu2.12632

Full text available

26
OPNsense Beginner to Professional: Protect Networks and Build Next-Generation Firewalls Easily with OPNsense
Material Type:
Book
Add to My Research

OPNsense Beginner to Professional: Protect Networks and Build Next-Generation Firewalls Easily with OPNsense

EISBN: 1801814058 ;EISBN: 9781801814058 ;OCLC: 1321802387

Full text available

27
A network attack link detection method based on the knowledge graph
Material Type:
Article
Add to My Research

A network attack link detection method based on the knowledge graph

Journal of physics. Conference series, 2022-10, Vol.2358 (1), p.12017 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2358/1/012017

Full text available

28
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0
Material Type:
Article
Add to My Research

Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0

Journal of physics. Conference series, 2020-09, Vol.1646 (1), p.12002 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1646/1/012002

Full text available

29
Human Aspects of Information Security and Assurance
Material Type:
Book
Add to My Research

Human Aspects of Information Security and Assurance

EISBN: 9781803821306 ;EISBN: 1803821302 ;OCLC: 1295276139

Full text available

30
An Effectual Secured Approach Against Sybil Attacks in Wireless Networks
Material Type:
Article
Add to My Research

An Effectual Secured Approach Against Sybil Attacks in Wireless Networks

International journal of interactive mobile technologies, 2022-05, Vol.16 (9), p.217-230 [Peer Reviewed Journal]

ISSN: 1865-7923 ;EISSN: 1865-7923 ;DOI: 10.3991/ijim.v16i09.30213

Full text available

31
Machine Learning for Optical Network Security Monitoring: A Practical Perspective
Material Type:
Article
Add to My Research

Machine Learning for Optical Network Security Monitoring: A Practical Perspective

Journal of lightwave technology, 2020-06, Vol.38 (11), p.2860 [Peer Reviewed Journal]

ISSN: 0733-8724 ;ISSN: 1558-2213 ;EISSN: 1558-2213 ;DOI: 10.1109/JLT.2020.2987032

Digital Resources/Online E-Resources

32
Smart Online Courses Using Computational Intelligence
Material Type:
Article
Add to My Research

Smart Online Courses Using Computational Intelligence

International journal of interactive mobile technologies, 2020-07, Vol.14 (12), p.29 [Peer Reviewed Journal]

ISSN: 1865-7923 ;EISSN: 1865-7923 ;DOI: 10.3991/ijim.v14i12.15601

Full text available

33
Research on the Application of Network Security Defense Based on Artificial Intelligence
Material Type:
Conference Proceeding
Add to My Research

Research on the Application of Network Security Defense Based on Artificial Intelligence

Journal of physics. Conference series, 2021, Vol.1992 (2) [Peer Reviewed Journal]

2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1992/2/022077

Full text available

34
Artificial Intelligence, Cybersecurity and Cyber Defence
Material Type:
Book
Add to My Research

Artificial Intelligence, Cybersecurity and Cyber Defence

ISBN: 9781119788188 ;ISBN: 1119788188 ;ISBN: 9781786304674 ;ISBN: 1786304678 ;EISBN: 9781119788188 ;EISBN: 1119788188 ;DOI: 10.1002/9781119788195 ;OCLC: 1204136680

Full text available

35
Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface
Material Type:
Article
Add to My Research

Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface

IEEE transactions on communications, 2020-12, Vol.68 (12), p.7851-7866 [Peer Reviewed Journal]

ISSN: 0090-6778 ;EISSN: 1558-0857 ;DOI: 10.1109/TCOMM.2020.3024621 ;CODEN: IECMBT

Digital Resources/Online E-Resources

36
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
Material Type:
Article
Add to My Research

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Proceedings of the IEEE, 2016-09, Vol.104 (9), p.1727-1765 [Peer Reviewed Journal]

ISSN: 0018-9219 ;EISSN: 1558-2256 ;DOI: 10.1109/JPROC.2016.2558521 ;CODEN: IEEPAD

Digital Resources/Online E-Resources

37
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals
Material Type:
Book
Add to My Research

Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals

ISBN: 9781119559610 ;ISBN: 1119559618 ;EISBN: 9781119559634 ;EISBN: 1119559634 ;EISBN: 1119559642 ;EISBN: 9781119559641 ;DOI: 10.1002/9781119559658 ;OCLC: 1079007841

Full text available

38
Research on Network Threat and Situation Assessment Method of Electric Power Information System
Material Type:
Article
Add to My Research

Research on Network Threat and Situation Assessment Method of Electric Power Information System

Journal of physics. Conference series, 2021-04, Vol.1883 (1), p.12105 [Peer Reviewed Journal]

2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1883/1/012105

Full text available

39
Research on the Application of Data Encryption Technology Based on Network Security Maintenance in Computer Network Security
Material Type:
Article
Add to My Research

Research on the Application of Data Encryption Technology Based on Network Security Maintenance in Computer Network Security

Journal of physics. Conference series, 2021-02, Vol.1744 (2), p.22060 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1744/2/022060

Full text available

40
Influence of physical and network security on company efficiency using SEM
Material Type:
Article
Add to My Research

Influence of physical and network security on company efficiency using SEM

Journal of physics. Conference series, 2019-11, Vol.1367 (1), p.12013 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1367/1/012013

Full text available

Results 21 - 40 of 41,825  for All Library Resources

previous page 1 Results 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (6,449)

Refine My Results

New Records 

  1. New From Last Month  (38)
  2. New From Last 3 Month  (153)
  3. More options open sub menu

Language 

  1. English  (41,599)
  2. Japanese  (201)
  3. Chinese  (70)
  4. Spanish  (53)
  5. German  (34)
  6. French  (27)
  7. Portuguese  (27)
  8. Czech  (16)
  9. Arabic  (13)
  10. Hungarian  (11)
  11. Russian  (10)
  12. Catalan  (7)
  13. Lithuanian  (6)
  14. Slovenian  (6)
  15. Polish  (5)
  16. Turkish  (3)
  17. Romanian  (3)
  18. Korean  (2)
  19. Persian  (2)
  20. Italian  (1)
  21. More options open sub menu

Journal Title 

  1. Computerworld  (1,796)
  2. Crn  (696)
  3. Eweek  (1,112)
  4. Informationweek  (1,054)
  5. Infoworld  (850)
  6. Internetweek  (374)
  7. Network World  (3,738)
  8. New York Times  (692)
  9. Sc Magazine  (1,423)
  10. The Washington Post  (477)
  11. More options open sub menu

Searching Remote Databases, Please Wait