skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 2,887  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Refined by: subject: Service Introduction remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Deep Learning Approach for Network Intrusion Detection System
Material Type:
Article
Add to My Research

A Deep Learning Approach for Network Intrusion Detection System

EAI endorsed transactions on security and safety, 2016-12, Vol.3 (9), p.21-6 [Peer Reviewed Journal]

2016. This work is licensed under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2032-9393 ;DOI: 10.4108/eai.3-12-2015.2262516

Full text available

2
Application of Data Encryption Technology in Computer Network Security
Material Type:
Article
Add to My Research

Application of Data Encryption Technology in Computer Network Security

Journal of physics. Conference series, 2019-06, Vol.1237 (2), p.22049 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1237/2/022049

Full text available

3
Research on Network Intrusion Detection Method Based on Machine Learning
Material Type:
Article
Add to My Research

Research on Network Intrusion Detection Method Based on Machine Learning

Journal of physics. Conference series, 2021-03, Vol.1861 (1), p.12034 [Peer Reviewed Journal]

2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1861/1/012034

Full text available

4
Analysis of Cryptography Encryption for Network Security
Material Type:
Article
Add to My Research

Analysis of Cryptography Encryption for Network Security

IOP conference series. Materials Science and Engineering, 2020-12, Vol.981 (2), p.22028 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1757-8981 ;EISSN: 1757-899X ;DOI: 10.1088/1757-899X/981/2/022028

Full text available

5
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Material Type:
Article
Add to My Research

CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network

Discrete dynamics in nature and society, 2020, Vol.2020, p.1-11 [Peer Reviewed Journal]

Copyright © 2020 Guojie Liu and Jianbiao Zhang. ;COPYRIGHT 2020 Hindawi Limited ;Copyright © 2020 Guojie Liu and Jianbiao Zhang. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. http://creativecommons.org/licenses/by/4.0 ;ISSN: 1026-0226 ;EISSN: 1607-887X ;DOI: 10.1155/2020/4705982

Full text available

6
A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN
Material Type:
Article
Add to My Research

A High-Throughput Hardware Implementation of NAT Traversal For IPSEC VPN

International journal of communication networks and information security, 2022-04, Vol.14 (1), p.43-50 [Peer Reviewed Journal]

Copyright Kohat University of Science and Technology (KUST) Apr 2022 ;ISSN: 2076-0930 ;ISSN: 2073-607X ;EISSN: 2073-607X ;DOI: 10.17762/ijcnis.v14i1.5260

Full text available

7
A Security Defect Diagnosis Method of Wireless Network based on Modal Symmetry Algorithm
Material Type:
Article
Add to My Research

A Security Defect Diagnosis Method of Wireless Network based on Modal Symmetry Algorithm

Journal of physics. Conference series, 2021-04, Vol.1881 (2), p.22069 [Peer Reviewed Journal]

2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1881/2/022069

Full text available

8
Application of Self-organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection
Material Type:
Article
Add to My Research

Application of Self-organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

Computers, materials & continua, 2019-01, Vol.61 (1), p.275-288

Copyright Tech Science Press 2019 ;2019. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1546-2226 ;ISSN: 1546-2218 ;EISSN: 1546-2226 ;DOI: 10.32604/cmc.2019.03735

Full text available

9
Research on meteorological information network security system based on VPN Technology
Material Type:
Article
Add to My Research

Research on meteorological information network security system based on VPN Technology

MATEC Web of Conferences, 2018-01, Vol.232, p.1001 [Peer Reviewed Journal]

2018. This work is licensed under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2261-236X ;ISSN: 2274-7214 ;EISSN: 2261-236X ;DOI: 10.1051/matecconf/201823201001

Full text available

10
Present and Future of Network Security Monitoring
Material Type:
Article
Add to My Research

Present and Future of Network Security Monitoring

IEEE access, 2021, Vol.9, p.112744-112760 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2021.3067106 ;CODEN: IAECCG

Full text available

11
SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program Graphs
Material Type:
Article
Add to My Research

SECURE-GEGELATI Always-On Intrusion Detection through GEGELATI Lightweight Tangled Program Graphs

Journal of signal processing systems, 2022-07, Vol.94 (7) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1939-8018 ;EISSN: 1939-8115 ;DOI: 10.1007/s11265-021-01728-1

Digital Resources/Online E-Resources

12
Implementation of Web Server Security Against Denial of Service (DoS) Attacks
Material Type:
Article
Add to My Research

Implementation of Web Server Security Against Denial of Service (DoS) Attacks

IOP conference series. Materials Science and Engineering, 2021-05, Vol.1125 (1), p.12037 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1757-8981 ;EISSN: 1757-899X ;DOI: 10.1088/1757-899X/1125/1/012037

Full text available

13
SDN/NFV-Based Security Service Function Tree for Cloud
Material Type:
Article
Add to My Research

SDN/NFV-Based Security Service Function Tree for Cloud

IEEE access, 2020, Vol.8, p.38538-38545 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2020.2974569 ;CODEN: IAECCG

Full text available

14
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
Material Type:
Article
Add to My Research

Feature dynamic deep learning approach for DDoS mitigation within the ISP domain

International journal of information security, 2020-02, Vol.19 (1), p.53-70 [Peer Reviewed Journal]

Springer-Verlag GmbH Germany, part of Springer Nature 2019 ;International Journal of Information Security is a copyright of Springer, (2019). All Rights Reserved. ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-019-00453-y

Full text available

15
The Development of the Open Machine-Learning-Based Anti-Spam (Open-MaLBAS)
Material Type:
Article
Add to My Research

The Development of the Open Machine-Learning-Based Anti-Spam (Open-MaLBAS)

IEEE access, 2021, Vol.9, p.138618-138632 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2021.3118901 ;CODEN: IAECCG

Full text available

16
LibraryVPN: A New Tool to Protect Patron Privacy
Material Type:
Article
Add to My Research

LibraryVPN: A New Tool to Protect Patron Privacy

Information technology and libraries, 2020-06, Vol.39 (2), p.1-3 [Peer Reviewed Journal]

COPYRIGHT 2020 American Library Association ;COPYRIGHT 2020 American Library Association ;2020. This work is published under https://creativecommons.org/licenses/by-nc/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 0730-9295 ;EISSN: 2163-5226 ;DOI: 10.6017/ital.v39i2.12391

Full text available

17
Efficient revocable hierarchical identity-based encryption using cryptographic accumulators
Material Type:
Article
Add to My Research

Efficient revocable hierarchical identity-based encryption using cryptographic accumulators

International journal of information security, 2018-08, Vol.17 (4), p.477-490 [Peer Reviewed Journal]

Springer-Verlag GmbH Germany 2017 ;International Journal of Information Security is a copyright of Springer, (2017). All Rights Reserved. ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-017-0387-8

Full text available

18
Analysis of The Game Mechanism in The Field of Network Security between China and the US and The Prospect of The Future
Material Type:
Article
Add to My Research

Analysis of The Game Mechanism in The Field of Network Security between China and the US and The Prospect of The Future

Journal of China and international relations, 2016-01, Vol.4 (2)

Copyright Aalborg Universitet 2016 ;EISSN: 2245-8921 ;DOI: 10.5278/ojs.jcir.v4i2.1698

Full text available

19
Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era
Material Type:
Article
Add to My Research

Towards Deployable, Distributed ISP Traffic Filtering for the Cloud-Era

Journal of network and systems management, 2018-07, Vol.26 (3), p.547-572 [Peer Reviewed Journal]

Springer Science+Business Media, LLC 2017 ;Journal of Network and Systems Management is a copyright of Springer, (2017). All Rights Reserved. ;ISSN: 1064-7570 ;EISSN: 1573-7705 ;DOI: 10.1007/s10922-017-9424-1

Full text available

20
Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays
Material Type:
Article
Add to My Research

Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays

IEEE access, 2016, Vol.4, p.6757-6765 [Peer Reviewed Journal]

Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2016.2614935 ;CODEN: IAECCG

Full text available

Results 1 - 20 of 2,887  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (43)

Refine My Results

Creation Date 

From To
  1. Before 1997  (170)
  2. 1997 To 2002  (1,252)
  3. 2003 To 2008  (1,087)
  4. 2009 To 2015  (227)
  5. After 2015  (151)
  6. More options open sub menu

Language 

  1. English  (2,885)
  2. Chinese  (2)
  3. Japanese  (1)
  4. More options open sub menu

Searching Remote Databases, Please Wait