-
1
Network Firewall Dynamics and the Subsaturation Stabilization of HIV
Published 2013-01-01“…We confirm the spontaneous emergence of network firewalls in the system and reveal their structural role in the nonspreading of HIV.…”
Get full text
Article -
2
APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS
Published 2013-06-01“…Nowadays, developing and evaluating pattern matching algorithms for the identification of network-attack has been constantly evolving. In this paper, the pattern matching algorithms is deployed by emulating forms of network attacks on intrusion detection system together with firewall IOS/I PS. …”
Get full text
Article -
3
Adaptive Conflict-Free Optimization of Rule Sets for Network Security Packet Filtering Devices
Published 2015-01-01“…Packet filtering and processing rules management in firewalls and security gateways has become commonplace in increasingly complex networks. …”
Get full text
Article -
4
Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering
Published 2020-05-01“… Keamanan pada Local Area Network (LAN) sekarang ini adalah masalah serius yang harus diperhatikan. …”
Get full text
Article -
5
A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
Published 2018-07-01“…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. This defense layer includes intrusion detection and prevention systems for hosts and networks. …”
Get full text
Article -
6
Research on new energy power plant network traffic anomaly detection method based on EMD
Published 2025-01-01“…Methodology This research propose Network Quality Assessment (NQA) traffic management algorithms to prevent illegal access and data breaches, this involves strong security measures such as encryption, firewalls, and encrypted communication methods. …”
Get full text
Article -
7
Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA
Published 2023-12-01“…Fending off attacks from outside the institutional or organizational network is relatively easier than fending off cybercrime attacks from within the network. …”
Get full text
Article -
8
PCIU: Hardware Implementations of an Efficient Packet Classification Algorithm with an Incremental Update Capability
Published 2011-01-01“…Packet classification plays a crucial role for a number of network services such as policy-based routing, firewalls, and traffic billing, to name a few. …”
Get full text
Article -
9
Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment
Published 2025-01-01“…Cyberattack recognition and mitigation techniques in CPSs include using numerous models like intrusion detection systems (IDSs), access control mechanisms, encryption, and firewalls. Cyberattack detection employing deep learning (DL) contains training neural networks to identify patterns indicative of malicious actions within system logs or network traffic, allowing positive classification and mitigation of cyber-attacks. …”
Get full text
Article -
10
Development of multi-agent information security management system
Published 2022-12-01“…Now there are security analysis systems, for example, that examine the security elements settings of workstations and servers operating systems, analyze the network topology, look for unprotected network connections, examine the settings of firewalls. …”
Get full text
Article