-
41
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
42
A differential feedback scheduling decision algorithm based on mimic defense
Published 2020-05-01Subjects: Get full text
Article -
43
Method of botnet network nodes detection base on communication similarity
Published 2018-10-01Subjects: Get full text
Article -
44
-
45
Network packet capture oriented INIC design and implementation
Published 2006-01-01Subjects: Get full text
Article -
46
-
47
-
48
Approach to making strategies for network security enhancement based on attack graphs
Published 2009-01-01Subjects: “…network security…”
Get full text
Article -
49
Innovative professional skills competition to create a police practice talents
Published 2019-06-01Subjects: “…network security…”
Get full text
Article -
50
System detecting network anomaly with visualization techniques
Published 2018-02-01Subjects: Get full text
Article -
51
Research on DNS authoritative server’s performance and security
Published 2006-01-01Subjects: Get full text
Article -
52
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: Get full text
Article -
53
Secure and transparent data aggregation for wireless sensor networks
Published 2012-10-01Subjects: Get full text
Article -
54
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01Subjects: Get full text
Article -
55
Distributed trust model based on parameter modeling
Published 2013-04-01Subjects: “…network security…”
Get full text
Article -
56
Survey of trustworthy pervasive social networking
Published 2016-02-01Subjects: Get full text
Article -
57
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
Published 2018-07-01Subjects: “…network security…”
Get full text
Article -
58
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
59
UC secure one-time signature based broadcast authentication
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
60
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article