-
61
-
62
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01Subjects: “…network security…”
Get full text
Article -
63
Network security of the National Natural Science Foundation of China: today and prospects
Published 2022-12-01Subjects: Get full text
Article -
64
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: “…network security…”
Get full text
Article -
65
Analysis of correspondence property for security protocols
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
66
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01Subjects: Get full text
Article -
67
Internet worm propagation model based on Markov chain
Published 2015-05-01Subjects: “…network security…”
Get full text
Article -
68
A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
69
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01Subjects: Get full text
Article -
70
Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security
Published 2023-01-01Subjects: Get full text
Article -
71
PaySwitch: Smart Contract-Based Payment Switch for Off-Chain Payment Channel Networks
Published 2025-01-01Subjects: Get full text
Article -
72
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
73
Detecting Spam albums in online social network
Published 2016-09-01Subjects: “…social network security…”
Get full text
Article -
74
Guiding the security protection of critical information infrastructure with scientific network security concept
Published 2019-09-01Subjects: Get full text
Article -
75
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
76
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
77
Network security situational awareness model based on threat intelligence
Published 2021-06-01Subjects: Get full text
Article -
78
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
Published 2015-10-01Subjects: Get full text
Article -
79
Domain name generation algorithm based on improved Markov chain
Published 2024-11-01Subjects: Get full text
Article -
80
The internet of battle things: a survey on communication challenges and recent solutions
Published 2025-01-01Subjects: Get full text
Article