ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Commercial network security---does anyone care?
Proceedings of the eighth symposium on Data communications - SIGCOMM '83
◽
10.1145/800034.800910
◽
1983
◽
Author(s):
Edmund L. Burke
Keyword(s):
Network Security
◽
Commercial Network
Download Full-text
Related Documents
Cited By
References
Commercial network security—does anyone care?
ACM SIGCOMM Computer Communication Review
◽
10.1145/964661.800910
◽
1983
◽
Vol 13
(4)
◽
pp. 123
Author(s):
Edmund L. Burke
Keyword(s):
Network Security
◽
Commercial Network
Download Full-text
Authorship Pattern and Collaborative Research in the Field of Network Security
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/21
◽
2011
◽
Vol 3
(1)
◽
pp. 52-54
◽
Cited By ~ 1
Author(s):
N. Amsaveni N. Amsaveni
◽
◽
R. Vasanthi R. Vasanthi
Keyword(s):
Network Security
◽
Collaborative Research
◽
Authorship Pattern
Download Full-text
OpenTag: Tag-Based User-Driven In-Network Packet Processing on Commercial Network Devices
IEICE Transactions on Communications
◽
10.1587/transcom.e96.b.31
◽
2013
◽
Vol E96.B
(1)
◽
pp. 31-39
Author(s):
Ryoji FURUHASHI
◽
Akihiro NAKAO
Keyword(s):
Packet Processing
◽
Commercial Network
Download Full-text
COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v69.i7.50
◽
2010
◽
Vol 69
(7)
◽
pp. 629-638
Author(s):
J. Sisniega-Gonzalez
◽
E. Aguirre-Anaya
◽
Mariko Nakano-Miyatake
◽
Hector Manuel Perez-Meana
Keyword(s):
Network Security
◽
Security Analysis
Download Full-text
REAL-TIME TRAFFIC DETECTION AND ANALYSIS OF NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v79.i12.30
◽
2020
◽
Vol 79
(12)
◽
pp. 1055-1062
Author(s):
A. L. Zhou
Keyword(s):
Network Security
◽
Real Time
◽
Intrusion Prevention
◽
Real Time Traffic
◽
Prevention System
◽
Intrusion Prevention System
◽
Traffic Detection
Download Full-text
Rule Based Network Security Using Genetic Algorithm
i-manager’s Journal on Software Engineering
◽
10.26634/jse.1.4.760
◽
2007
◽
Vol 1
(4)
◽
pp. 85-91
Author(s):
Jeya S
◽
◽
Ramar K
◽
Keyword(s):
Genetic Algorithm
◽
Network Security
◽
Rule Based
Download Full-text
Information technology. Security techniques. Network security
10.3403/30168527u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104
◽
2011
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/bsisoiec27033
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close