Current Search:  Computer security (x)

View All Items

  • CSV Spreadsheet
(21 - 40 of 82)

Pages

Intrusion detection in wireless networks: A data mining approach
Misuse Patterns for the SSL/TLS Protocol
Unifying the conceptual levels of network security through the use of patterns
Controlling access to physical locations
Universal physical access control system (UPACS)
Enabling access for mobile devices to the web services resource framework
Password-authenticated two-party key exchange with long-term security
Application level intrusion detection using a sequence learning algorithm
Efficient and Effective Searching m Unstructured FileSharing Peer-to-Peer Networks
Reputation-based system for encouraging cooperation of nodes in mobile ad hoc networks
SELECTED APPLICATIONS OF MPC
A Network Telescope Approach for Inferring and Characterizing IoT Exploitations
MACHINE LEARNING ALGORITHMS FOR PREDICTING BOTNET ATTACKS IN IOT NETWORKS
Formal specification of authorization and user group models for object-oriented databases
Security in voice over IP networks
comparative study of classification algorithms for network intrusion detection
ILLUMINATING CYBER THREATS FOR SMART CITIES: A DATA-DRIVEN APPROACH FOR CYBER ATTACK DETECTION WITH VISUAL CAPABILITIES
Group structures in object-oriented database authorization
NETWORK INTRUSION DETECTION AND DEEP LEARNING MECHANISMS
ENHANCING IOT DEVICES SECURITY: ENSEMBLE LEARNING WITH CLASSICAL APPROACHES FOR INTRUSION DETECTION SYSTEM

Pages