-
21
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
22
Securing the Clicks : network security in the age of social media /
Published 2012Subjects: “…Computer networks Security measures. 8590…”
View in OPAC
Book -
23
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: Get full text
Article -
24
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
25
-
26
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01Subjects: Get full text
Article -
27
PaySwitch: Smart Contract-Based Payment Switch for Off-Chain Payment Channel Networks
Published 2025-01-01Subjects: Get full text
Article -
28
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
29
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01Subjects: Get full text
Article -
30
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Subjects: Get full text
Article -
31
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book -
32
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: “…Network security…”
Get full text
Article -
33
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
34
-
35
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: “…computer and network security…”
Get full text
Article -
36
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
37
Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
Published 2014-01-01“…This control mechanism for benign worm propagation is of guiding significance to control the network security.…”
Get full text
Article -
38
Linear Complexity of a New Class of Quaternary Generalized Cyclotomic Sequence with Period 2pm
Published 2020-01-01Get full text
Article -
39
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. Malware becomes a major threat to network security. …”
Get full text
Article -
40
Multiple-Model Cardinality Balanced Multitarget Multi-Bernoulli Filter for Tracking Maneuvering Targets
Published 2013-01-01Get full text
Article