Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
![]() |
Retracted: Intelligence-based Network Security System to Predict the Possible Threats in Healthcare DataSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9783127Full text available |
2 |
Material Type: Article
|
![]() |
RETRACTED: Research on Network Security Maintenance Based on Computer TechnologyJournal of physics. Conference series, 2021-05, Vol.1915 (2), p.22001 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1915/2/022001Full text available |
3 |
Material Type: Article
|
![]() |
BOTNETs: A Network Security IssueInternational journal of advanced computer science & applications, 2020, Vol.11 (11)2020. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2158-107X ;EISSN: 2156-5570 ;DOI: 10.14569/IJACSA.2020.0111155Full text available |
4 |
Material Type: Article
|
![]() |
A data plane security model of segmented routing based on SDP trust enhancement architectureScientific reports, 2022-05, Vol.12 (1), p.8762-8762, Article 8762 [Peer Reviewed Journal]2022. The Author(s). ;The Author(s) 2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2022 ;ISSN: 2045-2322 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-022-12858-2 ;PMID: 35610296Full text available |
5 |
Material Type: Article
|
![]() |
Research on Computer Network Security Based on Firewall TechnologyJournal of physics. Conference series, 2021-02, Vol.1744 (4), p.42037 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1744/4/042037Full text available |
6 |
Material Type: Article
|
![]() |
Retracted: Research on Network Security Situational Awareness Based on Crawler AlgorithmSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9762641Full text available |
7 |
Material Type: Article
|
![]() |
Research on network security risk analysis method based on full trafficJournal of physics. Conference series, 2021-02, Vol.1792 (1), p.12038 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1792/1/012038Full text available |
8 |
Material Type: Article
|
![]() |
Design and Implementation of Power Network Security Protection System Based on Internet of ThingsJournal of physics. Conference series, 2022-01, Vol.2146 (1), p.12011 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2146/1/012011Full text available |
9 |
Material Type: Article
|
![]() |
Benchmarking NetBASILISK: a Network Security Project for ScienceEPJ Web of Conferences, 2021, Vol.251, p.2068 [Peer Reviewed Journal]2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2100-014X ;ISSN: 2101-6275 ;EISSN: 2100-014X ;DOI: 10.1051/epjconf/202125102068Full text available |
10 |
Material Type: Article
|
![]() |
MODEL FOR NETWORK SECURITY SERVICE PROVIDER SELECTION WITH PROBABILISTIC UNCERTAIN LINGUISTIC TODIM METHOD BASED ON PROSPECT THEORYTechnological and economic development of economy, 2022-03, Vol.28 (3), p.638-654 [Peer Reviewed Journal]2022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2029-4913 ;EISSN: 2029-4921 ;DOI: 10.3846/tede.2022.16483Full text available |
11 |
Material Type: Article
|
![]() |
Some Certiticateless Short Signature Schemes of Security Analysis and Simple ImprovementJournal of physics. Conference series, 2020-11, Vol.1673 (1), p.12050 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1673/1/012050Full text available |
12 |
Material Type: Article
|
![]() |
Key management scheme of distributed IoT devices based on blockchainsIET communications, 2023-07, Vol.17 (12), p.1409-1417 [Peer Reviewed Journal]2023 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8628 ;EISSN: 1751-8636 ;DOI: 10.1049/cmu2.12632Full text available |
13 |
Material Type: Article
|
![]() |
A network attack link detection method based on the knowledge graphJournal of physics. Conference series, 2022-10, Vol.2358 (1), p.12017 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;Published under licence by IOP Publishing Ltd. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/2358/1/012017Full text available |
14 |
Material Type: Article
|
![]() |
Research and Evaluation of Security Audit Technology in the Era of Network Security Level Protection 2.0Journal of physics. Conference series, 2020-09, Vol.1646 (1), p.12002 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1646/1/012002Full text available |
15 |
Material Type: Article
|
![]() |
An Effectual Secured Approach Against Sybil Attacks in Wireless NetworksInternational journal of interactive mobile technologies, 2022-05, Vol.16 (9), p.217-230 [Peer Reviewed Journal]ISSN: 1865-7923 ;EISSN: 1865-7923 ;DOI: 10.3991/ijim.v16i09.30213Full text available |
16 |
Material Type: Article
|
![]() |
Smart Online Courses Using Computational IntelligenceInternational journal of interactive mobile technologies, 2020-07, Vol.14 (12), p.29 [Peer Reviewed Journal]ISSN: 1865-7923 ;EISSN: 1865-7923 ;DOI: 10.3991/ijim.v14i12.15601Full text available |
17 |
Material Type: Conference Proceeding
|
![]() |
Research on the Application of Network Security Defense Based on Artificial IntelligenceJournal of physics. Conference series, 2021, Vol.1992 (2) [Peer Reviewed Journal]2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1992/2/022077Full text available |
18 |
Material Type: Article
|
![]() |
Research on Network Threat and Situation Assessment Method of Electric Power Information SystemJournal of physics. Conference series, 2021-04, Vol.1883 (1), p.12105 [Peer Reviewed Journal]2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1883/1/012105Full text available |
19 |
Material Type: Article
|
![]() |
Research on the Application of Data Encryption Technology Based on Network Security Maintenance in Computer Network SecurityJournal of physics. Conference series, 2021-02, Vol.1744 (2), p.22060 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1744/2/022060Full text available |
20 |
Material Type: Article
|
![]() |
Influence of physical and network security on company efficiency using SEMJournal of physics. Conference series, 2019-11, Vol.1367 (1), p.12013 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1367/1/012013Full text available |