skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 3,683  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Retracted: Intelligence-based Network Security System to Predict the Possible Threats in Healthcare Data
Material Type:
Article
Add to My Research

Retracted: Intelligence-based Network Security System to Predict the Possible Threats in Healthcare Data

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9783127

Full text available

2
RETRACTED: Research on Network Security Maintenance Based on Computer Technology
Material Type:
Article
Add to My Research

RETRACTED: Research on Network Security Maintenance Based on Computer Technology

Journal of physics. Conference series, 2021-05, Vol.1915 (2), p.22001 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1915/2/022001

Full text available

3
BOTNETs: A Network Security Issue
Material Type:
Article
Add to My Research

BOTNETs: A Network Security Issue

International journal of advanced computer science & applications, 2020, Vol.11 (11)

2020. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2158-107X ;EISSN: 2156-5570 ;DOI: 10.14569/IJACSA.2020.0111155

Full text available

4
A data plane security model of segmented routing based on SDP trust enhancement architecture
Material Type:
Article
Add to My Research

A data plane security model of segmented routing based on SDP trust enhancement architecture

Scientific reports, 2022-05, Vol.12 (1), p.8762-8762, Article 8762 [Peer Reviewed Journal]

2022. The Author(s). ;The Author(s) 2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2022 ;ISSN: 2045-2322 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-022-12858-2 ;PMID: 35610296

Full text available

5
Research on Computer Network Security Based on Firewall Technology
Material Type:
Article
Add to My Research

Research on Computer Network Security Based on Firewall Technology

Journal of physics. Conference series, 2021-02, Vol.1744 (4), p.42037 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1744/4/042037

Full text available

6
Retracted: Research on Network Security Situational Awareness Based on Crawler Algorithm
Material Type:
Article
Add to My Research

Retracted: Research on Network Security Situational Awareness Based on Crawler Algorithm

Security and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9762641

Full text available

7
Research on network security risk analysis method based on full traffic
Material Type:
Article
Add to My Research

Research on network security risk analysis method based on full traffic

Journal of physics. Conference series, 2021-02, Vol.1792 (1), p.12038 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1792/1/012038

Full text available

8
Design and Implementation of Power Network Security Protection System Based on Internet of Things
Material Type:
Article
Add to My Research

Design and Implementation of Power Network Security Protection System Based on Internet of Things

Journal of physics. Conference series, 2022-01, Vol.2146 (1), p.12011 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2146/1/012011

Full text available

9
Benchmarking NetBASILISK: a Network Security Project for Science
Material Type:
Article
Add to My Research

Benchmarking NetBASILISK: a Network Security Project for Science

EPJ Web of Conferences, 2021, Vol.251, p.2068 [Peer Reviewed Journal]

2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2100-014X ;ISSN: 2101-6275 ;EISSN: 2100-014X ;DOI: 10.1051/epjconf/202125102068

Full text available

10
MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORY
Material Type:
Article
Add to My Research

MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORY

Technological and economic development of economy, 2022-03, Vol.28 (3), p.638-654 [Peer Reviewed Journal]

2022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2029-4913 ;EISSN: 2029-4921 ;DOI: 10.3846/tede.2022.16483

Full text available

11
Some Certiticateless Short Signature Schemes of Security Analysis and Simple Improvement
Material Type:
Article
Add to My Research

Some Certiticateless Short Signature Schemes of Security Analysis and Simple Improvement

Journal of physics. Conference series, 2020-11, Vol.1673 (1), p.12050 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1673/1/012050

Full text available

12
Key management scheme of distributed IoT devices based on blockchains
Material Type:
Article
Add to My Research

Key management scheme of distributed IoT devices based on blockchains

IET communications, 2023-07, Vol.17 (12), p.1409-1417 [Peer Reviewed Journal]

2023 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8628 ;EISSN: 1751-8636 ;DOI: 10.1049/cmu2.12632

Full text available

13
A network attack link detection method based on the knowledge graph
Material Type:
Article
Add to My Research

A network attack link detection method based on the knowledge graph

Journal of physics. Conference series, 2022-10, Vol.2358 (1), p.12017 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2358/1/012017

Full text available

14
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0
Material Type:
Article
Add to My Research

Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0

Journal of physics. Conference series, 2020-09, Vol.1646 (1), p.12002 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1646/1/012002

Full text available

15
An Effectual Secured Approach Against Sybil Attacks in Wireless Networks
Material Type:
Article
Add to My Research

An Effectual Secured Approach Against Sybil Attacks in Wireless Networks

International journal of interactive mobile technologies, 2022-05, Vol.16 (9), p.217-230 [Peer Reviewed Journal]

ISSN: 1865-7923 ;EISSN: 1865-7923 ;DOI: 10.3991/ijim.v16i09.30213

Full text available

16
Smart Online Courses Using Computational Intelligence
Material Type:
Article
Add to My Research

Smart Online Courses Using Computational Intelligence

International journal of interactive mobile technologies, 2020-07, Vol.14 (12), p.29 [Peer Reviewed Journal]

ISSN: 1865-7923 ;EISSN: 1865-7923 ;DOI: 10.3991/ijim.v14i12.15601

Full text available

17
Research on the Application of Network Security Defense Based on Artificial Intelligence
Material Type:
Conference Proceeding
Add to My Research

Research on the Application of Network Security Defense Based on Artificial Intelligence

Journal of physics. Conference series, 2021, Vol.1992 (2) [Peer Reviewed Journal]

2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1992/2/022077

Full text available

18
Research on Network Threat and Situation Assessment Method of Electric Power Information System
Material Type:
Article
Add to My Research

Research on Network Threat and Situation Assessment Method of Electric Power Information System

Journal of physics. Conference series, 2021-04, Vol.1883 (1), p.12105 [Peer Reviewed Journal]

2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1883/1/012105

Full text available

19
Research on the Application of Data Encryption Technology Based on Network Security Maintenance in Computer Network Security
Material Type:
Article
Add to My Research

Research on the Application of Data Encryption Technology Based on Network Security Maintenance in Computer Network Security

Journal of physics. Conference series, 2021-02, Vol.1744 (2), p.22060 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1744/2/022060

Full text available

20
Influence of physical and network security on company efficiency using SEM
Material Type:
Article
Add to My Research

Influence of physical and network security on company efficiency using SEM

Journal of physics. Conference series, 2019-11, Vol.1367 (1), p.12013 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1367/1/012013

Full text available

Results 1 - 20 of 3,683  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (3,232)

Refine My Results

Creation Date 

From To
  1. Before 2003  (7)
  2. 2003 To 2007  (19)
  3. 2008 To 2012  (304)
  4. 2013 To 2018  (1,034)
  5. After 2018  (2,318)
  6. More options open sub menu

Language 

  1. English  (3,599)
  2. Japanese  (64)
  3. Chinese  (60)
  4. Spanish  (26)
  5. Portuguese  (24)
  6. Arabic  (13)
  7. Russian  (8)
  8. Polish  (4)
  9. Lithuanian  (4)
  10. Persian  (2)
  11. Slovenian  (2)
  12. Romanian  (2)
  13. French  (1)
  14. Indonesian  (1)
  15. Ukrainian  (1)
  16. Czech  (1)
  17. Croatian  (1)
  18. More options open sub menu

Searching Remote Databases, Please Wait