ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Basic Network Security Concepts
Mapping Intimacies
◽
10.1002/9781119244400.ch2
◽
2021
◽
pp. 13-25
Keyword(s):
Network Security
◽
Basic Network
Download Full-text
Related Documents
Cited By
References
Authorship Pattern and Collaborative Research in the Field of Network Security
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/21
◽
2011
◽
Vol 3
(1)
◽
pp. 52-54
◽
Cited By ~ 1
Author(s):
N. Amsaveni N. Amsaveni
◽
◽
R. Vasanthi R. Vasanthi
Keyword(s):
Network Security
◽
Collaborative Research
◽
Authorship Pattern
Download Full-text
COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v69.i7.50
◽
2010
◽
Vol 69
(7)
◽
pp. 629-638
Author(s):
J. Sisniega-Gonzalez
◽
E. Aguirre-Anaya
◽
Mariko Nakano-Miyatake
◽
Hector Manuel Perez-Meana
Keyword(s):
Network Security
◽
Security Analysis
Download Full-text
REAL-TIME TRAFFIC DETECTION AND ANALYSIS OF NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v79.i12.30
◽
2020
◽
Vol 79
(12)
◽
pp. 1055-1062
Author(s):
A. L. Zhou
Keyword(s):
Network Security
◽
Real Time
◽
Intrusion Prevention
◽
Real Time Traffic
◽
Prevention System
◽
Intrusion Prevention System
◽
Traffic Detection
Download Full-text
Rule Based Network Security Using Genetic Algorithm
i-manager’s Journal on Software Engineering
◽
10.26634/jse.1.4.760
◽
2007
◽
Vol 1
(4)
◽
pp. 85-91
Author(s):
Jeya S
◽
◽
Ramar K
◽
Keyword(s):
Genetic Algorithm
◽
Network Security
◽
Rule Based
Download Full-text
Information technology. Security techniques. Network security
10.3403/30168527u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104
◽
2011
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/bsisoiec27033
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Faculty Opinions recommendation of From swimming to walking: a single basic network for two different behaviors.
Faculty Opinions – Post-Publication Peer Review of the Biomedical Literature
◽
10.3410/f.1011942.183286
◽
2003
◽
Author(s):
Trevor Drew
Keyword(s):
Basic Network
Download Full-text
Network Security Situation Awareness Approach Based on Markov Game Model
Journal of Software
◽
10.3724/sp.j.1001.2011.03751
◽
2011
◽
Vol 22
(3)
◽
pp. 495-508
◽
Cited By ~ 26
Author(s):
Yong ZHANG
◽
Xiao-Bin TAN
◽
Xiao-Lin CUI
◽
Hong-Sheng XI
Keyword(s):
Network Security
◽
Situation Awareness
◽
Game Model
◽
Markov Game
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close