-
21
An Improved Network Risk Evaluation Metbod Based on Markov Game
Published 2014-07-01Subjects: “…network security…”
Get full text
Article -
22
-
23
Research on software-defined network and the security defense technology
Published 2017-11-01Subjects: Get full text
Article -
24
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01Subjects: Get full text
Article -
25
Causes and optimization of the false alarm rate of code review system
Published 2020-12-01Subjects: Get full text
Article -
26
User-habit based early warning of worm
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
27
Research on intrusion detection based on an improved GHSOM
Published 2011-01-01Subjects: “…network security…”
Get full text
Article -
28
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
29
-
30
Research on IMS Core Network Security Index System
Published 2014-08-01Subjects: Get full text
Article -
31
Trustworthy identity system based on IPv6 source address validation
Published 2014-10-01Subjects: Get full text
Article -
32
Transductive quantitative calculation approach of network abnormality index
Published 2013-08-01Subjects: “…network security…”
Get full text
Article -
33
Research on security scenarios and security models for 6G networking
Published 2021-02-01Subjects: Get full text
Article -
34
Traffic measurement algorithm based on least recent used and Bloom filter
Published 2013-01-01Subjects: “…network security…”
Get full text
Article -
35
Research and practice of network security threat intelligence management system for power enterprise
Published 2022-07-01Subjects: “…network security…”
Get full text
Article -
36
Evaluating the network security by the Read<sub>W</sub>rite transition model
Published 2010-01-01Subjects: Get full text
Article -
37
Method to generate attack graphs for assessing the overall security of networks
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
38
Constitute the passive infrastructure in network
Published 2003-01-01Subjects: “…network security…”
Get full text
Article -
39
Visualization analysis and design of DDoS attack
Published 2017-02-01Subjects: “…network security…”
Get full text
Article -
40
User authentication scheme based on the ElGamal signature for mobile communication system
Published 2005-01-01Subjects: Get full text
Article