ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Representing TCP/IP connectivity for topological analysis of network security
18th Annual Computer Security Applications Conference, 2002. Proceedings.
◽
10.1109/csac.2002.1176275
◽
2003
◽
Cited By ~ 35
Author(s):
R. Ritchey
◽
B. O'Berry
◽
S. Noel
Keyword(s):
Network Security
◽
Topological Analysis
Download Full-text
Related Documents
Cited By
References
The Foundations of Topological Analysis: A Straightforward Introduction
10.1017/cbo9780511566110
◽
1981
◽
Cited By ~ 3
Author(s):
K. G. Binmore
Keyword(s):
Topological Analysis
Download Full-text
ON THE CHEMICAL BONDING FEATURES IN PALLADIUM CONTAINING COMPOUNDS: A COMBINED QTAIM/DFT TOPOLOGICAL ANALYSIS
Журнал структурной химии
◽
10.15372/jsc20170307
◽
2017
◽
Keyword(s):
Chemical Bonding
◽
Topological Analysis
Download Full-text
Authorship Pattern and Collaborative Research in the Field of Network Security
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/21
◽
2011
◽
Vol 3
(1)
◽
pp. 52-54
◽
Cited By ~ 1
Author(s):
N. Amsaveni N. Amsaveni
◽
◽
R. Vasanthi R. Vasanthi
Keyword(s):
Network Security
◽
Collaborative Research
◽
Authorship Pattern
Download Full-text
COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v69.i7.50
◽
2010
◽
Vol 69
(7)
◽
pp. 629-638
Author(s):
J. Sisniega-Gonzalez
◽
E. Aguirre-Anaya
◽
Mariko Nakano-Miyatake
◽
Hector Manuel Perez-Meana
Keyword(s):
Network Security
◽
Security Analysis
Download Full-text
REAL-TIME TRAFFIC DETECTION AND ANALYSIS OF NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v79.i12.30
◽
2020
◽
Vol 79
(12)
◽
pp. 1055-1062
Author(s):
A. L. Zhou
Keyword(s):
Network Security
◽
Real Time
◽
Intrusion Prevention
◽
Real Time Traffic
◽
Prevention System
◽
Intrusion Prevention System
◽
Traffic Detection
Download Full-text
Rule Based Network Security Using Genetic Algorithm
i-manager’s Journal on Software Engineering
◽
10.26634/jse.1.4.760
◽
2007
◽
Vol 1
(4)
◽
pp. 85-91
Author(s):
Jeya S
◽
◽
Ramar K
◽
Keyword(s):
Genetic Algorithm
◽
Network Security
◽
Rule Based
Download Full-text
DIMENSIONING OF THE FRONTAL SUSPENSION SYSTEM OF THE DOUBLE-A TYPE THROUGH TOPOLOGICAL ANALYSIS.
10.26678/abcm.cobem2017.cob17-1986
◽
2017
◽
Author(s):
Tiago Ferreira
◽
Thiago Moreira
◽
Gustavo Melchiades
◽
Lucas Ferreira
◽
Diógenes Sena de França e Silva
Keyword(s):
Topological Analysis
◽
Suspension System
Download Full-text
Information technology. Security techniques. Network security
10.3403/30168527u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104
◽
2011
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close