ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Memristor Based Neuromorphic Network Security System Capable of Online Incremental Learning and Anomaly Detection
2020 11th International Green and Sustainable Computing Workshops (IGSC)
◽
10.1109/igsc51522.2020.9291053
◽
2020
◽
Author(s):
Md. Shahanur Alam
◽
Chris Yakopcic
◽
Guru Subramanyam
◽
Tarek M. Taha
Keyword(s):
Network Security
◽
Anomaly Detection
◽
Incremental Learning
◽
Security System
◽
Online Incremental Learning
◽
Network Security System
Download Full-text
Related Documents
Cited By
References
Research on data acquisition model in network security system
2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE)
◽
10.1109/iccae.2010.5451546
◽
2010
◽
Author(s):
Ma Jun
◽
Yi Zhengjiang
Keyword(s):
Network Security
◽
Data Acquisition
◽
Security System
◽
Network Security System
Download Full-text
ISM-based architecture for network security system
2010 International Conference on Educational and Information Technology
◽
10.1109/iceit.2010.5607649
◽
2010
◽
Author(s):
Zhanfei Ma
Keyword(s):
Network Security
◽
Security System
◽
Network Security System
Download Full-text
Application and Implementation of Big Data Visualization Technology in Network Security System
Journal of Physics Conference Series
◽
10.1088/1742-6596/1955/1/012002
◽
2021
◽
Vol 1955
(1)
◽
pp. 012002
Author(s):
Chao Tang
◽
Jie Zhang
◽
Sheng Wang
◽
Linghao Zhang
◽
Hai Wang
◽
...
Keyword(s):
Big Data
◽
Network Security
◽
Data Visualization
◽
Security System
◽
Big Data Visualization
◽
Visualization Technology
◽
Network Security System
Download Full-text
Imperative to Build Network Security System and Speed Up the Future Network Construction
International Journal of Advanced Network Monitoring and Controls
◽
10.21307/ijanmc-2020-040
◽
2021
◽
Vol 5
(4)
◽
pp. 75-81
Author(s):
Aiqun Wu
◽
Zhangxing Gao
Keyword(s):
Network Security
◽
Security System
◽
Network Construction
◽
The Future
◽
Speed Up
◽
Network Security System
Download Full-text
Security Analysis on China Campus Network and Construction on Network Security System
Journal of Convergence Information Technology
◽
10.4156/jcit.vol6.issue11.19
◽
2011
◽
Vol 6
(11)
◽
pp. 166-174
◽
Cited By ~ 2
Author(s):
Xiangya Tao
◽
Changyun Jia
◽
Cheng Yang
Keyword(s):
Network Security
◽
Security Analysis
◽
Security System
◽
Campus Network
◽
Network Security System
Download Full-text
Design and Implementation of Linked Network Security System Based on Virtualization in the Separate Network Environment
IT Convergence and Security 2012 - Lecture Notes in Electrical Engineering
◽
10.1007/978-94-007-5860-5_10
◽
2012
◽
pp. 79-85
Author(s):
Dong-Hwi Lee
◽
Kyong-Ho Choi
Keyword(s):
Network Security
◽
Security System
◽
Network Environment
◽
Design And Implementation
◽
Network Security System
Download Full-text
Design and Implementation of Enterprise Network Security System Based on Firewall
Advances in Intelligent Systems and Computing - Cyber Security Intelligence and Analytics
◽
10.1007/978-3-030-15235-2_142
◽
2019
◽
pp. 1070-1078
Author(s):
Hui Yuan
◽
Lei Zheng
◽
Shuang Qiu
◽
Xiangli Peng
◽
Yuan Liang
◽
...
Keyword(s):
Network Security
◽
Security System
◽
Enterprise Network
◽
Design And Implementation
◽
Enterprise Network Security
◽
Network Security System
Download Full-text
An efficient network security system through an ontology approach
2008 International Conference on Innovations in Information Technology
◽
10.1109/innovations.2008.4781636
◽
2008
◽
Author(s):
A.H. Azni
◽
Madihah Mohd Saudi
◽
Azreen Azman
◽
Emran Mohd Tamil
◽
Mohd Yamani Idna Idris
Keyword(s):
Network Security
◽
Security System
◽
Network Security System
Download Full-text
Intrusion-resilient, DDoS-resistant and agent-assisted network security system
2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07)
◽
10.1109/broadnets.2007.4550444
◽
2007
◽
Author(s):
Tong Liu
◽
Chwan-Hwa Wu
Keyword(s):
Network Security
◽
Security System
◽
Network Security System
Download Full-text
Development and Design of Network Security System Software Based on Big Data Analysis Technology
Journal of Physics Conference Series
◽
10.1088/1742-6596/1992/2/022145
◽
2021
◽
Vol 1992
(2)
◽
pp. 022145
Author(s):
Xiang Wang
◽
Zheng Li
◽
Haiming Hong
◽
Minghui Zhou
Keyword(s):
Big Data
◽
Data Analysis
◽
Network Security
◽
Big Data Analysis
◽
Security System
◽
System Software
◽
Network Security System
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close