-
121
Research on intrusion detection system based on two-level algorithm
Published 2005-01-01Subjects: “…network security…”
Get full text
Article -
122
Fast reused code tracing method based on simhash and inverted index
Published 2016-11-01Subjects: “…network security…”
Get full text
Article -
123
Analysis of correspondence property for security protocols
Published 2006-01-01Subjects: “…network security…”
Get full text
Article -
124
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01Subjects: Get full text
Article -
125
Internet worm propagation model based on Markov chain
Published 2015-05-01Subjects: “…network security…”
Get full text
Article -
126
A Simple Approach for Mitigating a New Flooding Attack in RPL-Based IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
127
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01Subjects: Get full text
Article -
128
PaySwitch: Smart Contract-Based Payment Switch for Off-Chain Payment Channel Networks
Published 2025-01-01Subjects: Get full text
Article -
129
Security of the deployment of SDN-based IoT using blockchain
Published 2020-12-01Subjects: “…network security…”
Get full text
Article -
130
Detecting Spam albums in online social network
Published 2016-09-01Subjects: “…social network security…”
Get full text
Article -
131
Mechanism and implementation of Rootkit attack and defense
Published 2018-12-01Subjects: Get full text
Article -
132
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
133
Detection and Control Technology of Distributed DNS Reflective DDoS Attack
Published 2015-10-01Subjects: Get full text
Article -
134
Domain name generation algorithm based on improved Markov chain
Published 2024-11-01Subjects: Get full text
Article -
135
The internet of battle things: a survey on communication challenges and recent solutions
Published 2025-01-01Subjects: Get full text
Article -
136
Machine learning-based detection, identification and restoration method of jamming attacks in optical networks
Published 2023-07-01Subjects: Get full text
Article -
137
Traffic anomaly detection method in networks based on improved clustering algorithm
Published 2015-12-01Subjects: “…network security…”
Get full text
Article -
138
Mobile malware traffic detection approach based on value-derivative GRU
Published 2020-01-01Subjects: “…network security…”
Get full text
Article -
139
A network intrusion detection method designed for few-shot scenarios
Published 2023-10-01Subjects: Get full text
Article -
140
Efficient scheme for user's trajectory privacy
Published 2015-12-01Subjects: “…wireless network security…”
Get full text
Article