Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
A Deep Learning Approach for Network Intrusion Detection SystemEAI endorsed transactions on security and safety, 2016-12, Vol.3 (9), p.21-6 [Peer Reviewed Journal]2016. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2032-9393 ;DOI: 10.4108/eai.3-12-2015.2262516Full text available |
|
2 |
Material Type: Article
|
Application of Data Encryption Technology in Computer Network SecurityJournal of physics. Conference series, 2019-06, Vol.1237 (2), p.22049 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1237/2/022049Full text available |
|
3 |
Material Type: Article
|
Research on Network Intrusion Detection Method Based on Machine LearningJournal of physics. Conference series, 2021-03, Vol.1861 (1), p.12034 [Peer Reviewed Journal]2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1861/1/012034Full text available |
|
4 |
Material Type: Article
|
Analysis of Cryptography Encryption for Network SecurityIOP conference series. Materials Science and Engineering, 2020-12, Vol.981 (2), p.22028 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1757-8981 ;EISSN: 1757-899X ;DOI: 10.1088/1757-899X/981/2/022028Full text available |
|
5 |
Material Type: Article
|
CNID: Research of Network Intrusion Detection Based on Convolutional Neural NetworkDiscrete dynamics in nature and society, 2020, Vol.2020, p.1-11 [Peer Reviewed Journal]Copyright © 2020 Guojie Liu and Jianbiao Zhang. ;COPYRIGHT 2020 Hindawi Limited ;Copyright © 2020 Guojie Liu and Jianbiao Zhang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0 ;ISSN: 1026-0226 ;EISSN: 1607-887X ;DOI: 10.1155/2020/4705982Full text available |
|
6 |
Material Type: Article
|
A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPNInternational journal of communication networks and information security, 2022-04, Vol.14 (1), p.43-50 [Peer Reviewed Journal]Copyright Kohat University of Science and Technology (KUST) Apr 2022 ;ISSN: 2076-0930 ;ISSN: 2073-607X ;EISSN: 2073-607X ;DOI: 10.17762/ijcnis.v14i1.5260Full text available |
|
7 |
Material Type: Article
|
A Security Defect Diagnosis Method of Wireless Network based on Modal Symmetry AlgorithmJournal of physics. Conference series, 2021-04, Vol.1881 (2), p.22069 [Peer Reviewed Journal]2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1881/2/022069Full text available |
|
8 |
Material Type: Article
|
Application of Self-organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion DetectionComputers, materials & continua, 2019-01, Vol.61 (1), p.275-288Copyright Tech Science Press 2019 ;2019. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1546-2226 ;ISSN: 1546-2218 ;EISSN: 1546-2226 ;DOI: 10.32604/cmc.2019.03735Full text available |
|
9 |
Material Type: Article
|
Research on meteorological information network security system based on VPN TechnologyMATEC Web of Conferences, 2018-01, Vol.232, p.1001 [Peer Reviewed Journal]2018. This work is licensed under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2261-236X ;ISSN: 2274-7214 ;EISSN: 2261-236X ;DOI: 10.1051/matecconf/201823201001Full text available |
|
10 |
Material Type: Article
|
Present and Future of Network Security MonitoringIEEE access, 2021, Vol.9, p.112744-112760 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2021.3067106 ;CODEN: IAECCGFull text available |
|
11 |
Material Type: Article
|
SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program GraphsJournal of signal processing systems, 2022-07, Vol.94 (7) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1939-8018 ;EISSN: 1939-8115 ;DOI: 10.1007/s11265-021-01728-1Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
Implementation of Web Server Security Against Denial of Service (DoS) AttacksIOP conference series. Materials Science and Engineering, 2021-05, Vol.1125 (1), p.12037 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1757-8981 ;EISSN: 1757-899X ;DOI: 10.1088/1757-899X/1125/1/012037Full text available |
|
13 |
Material Type: Article
|
SDN/NFV-Based Security Service Function Tree for CloudIEEE access, 2020, Vol.8, p.38538-38545 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2020.2974569 ;CODEN: IAECCGFull text available |
|
14 |
Material Type: Article
|
Feature dynamic deep learning approach for DDoS mitigation within the ISP domainInternational journal of information security, 2020-02, Vol.19 (1), p.53-70 [Peer Reviewed Journal]Springer-Verlag GmbH Germany, part of Springer Nature 2019 ;International Journal of Information Security is a copyright of Springer, (2019). All Rights Reserved. ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-019-00453-yFull text available |
|
15 |
Material Type: Article
|
The Development of the Open Machine-Learning-Based Anti-Spam (Open-MaLBAS)IEEE access, 2021, Vol.9, p.138618-138632 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2021.3118901 ;CODEN: IAECCGFull text available |
|
16 |
Material Type: Article
|
LibraryVPN: A New Tool to Protect Patron PrivacyInformation technology and libraries, 2020-06, Vol.39 (2), p.1-3 [Peer Reviewed Journal]COPYRIGHT 2020 American Library Association ;COPYRIGHT 2020 American Library Association ;2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 0730-9295 ;EISSN: 2163-5226 ;DOI: 10.6017/ital.v39i2.12391Full text available |
|
17 |
Material Type: Article
|
Efficient revocable hierarchical identity-based encryption using cryptographic accumulatorsInternational journal of information security, 2018-08, Vol.17 (4), p.477-490 [Peer Reviewed Journal]Springer-Verlag GmbH Germany 2017 ;International Journal of Information Security is a copyright of Springer, (2017). All Rights Reserved. ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-017-0387-8Full text available |
|
18 |
Material Type: Article
|
Analysis of The Game Mechanism in The Field of Network Security between China and the US and The Prospect of The FutureJournal of China and international relations, 2016-01, Vol.4 (2)Copyright Aalborg Universitet 2016 ;EISSN: 2245-8921 ;DOI: 10.5278/ojs.jcir.v4i2.1698Full text available |
|
19 |
Material Type: Article
|
Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-EraJournal of network and systems management, 2018-07, Vol.26 (3), p.547-572 [Peer Reviewed Journal]Springer Science+Business Media, LLC 2017 ;Journal of Network and Systems Management is a copyright of Springer, (2017). All Rights Reserved. ;ISSN: 1064-7570 ;EISSN: 1573-7705 ;DOI: 10.1007/s10922-017-9424-1Full text available |
|
20 |
Material Type: Article
|
Detecting and Tracing i.i.d. Attacks in Networks With Any Number of RelaysIEEE access, 2016, Vol.4, p.6757-6765 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2016.2614935 ;CODEN: IAECCGFull text available |