-
101
Quantum secure communication network architecture and mobile application solution
Published 2018-09-01Subjects: Get full text
Article -
102
A differential feedback scheduling decision algorithm based on mimic defense
Published 2020-05-01Subjects: Get full text
Article -
103
Method of botnet network nodes detection base on communication similarity
Published 2018-10-01Subjects: Get full text
Article -
104
-
105
Network packet capture oriented INIC design and implementation
Published 2006-01-01Subjects: Get full text
Article -
106
-
107
-
108
Innovative professional skills competition to create a police practice talents
Published 2019-06-01Subjects: “…network security…”
Get full text
Article -
109
System detecting network anomaly with visualization techniques
Published 2018-02-01Subjects: Get full text
Article -
110
Research on DNS authoritative server’s performance and security
Published 2006-01-01Subjects: Get full text
Article -
111
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: Get full text
Article -
112
Secure and transparent data aggregation for wireless sensor networks
Published 2012-10-01Subjects: Get full text
Article -
113
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01Subjects: Get full text
Article -
114
Distributed trust model based on parameter modeling
Published 2013-04-01Subjects: “…network security…”
Get full text
Article -
115
Survey of trustworthy pervasive social networking
Published 2016-02-01Subjects: Get full text
Article -
116
Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm
Published 2018-07-01Subjects: “…network security…”
Get full text
Article -
117
Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
Published 2017-01-01Subjects: “…network security…”
Get full text
Article -
118
UC secure one-time signature based broadcast authentication
Published 2010-01-01Subjects: “…network security…”
Get full text
Article -
119
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
120