Designing security of personal data in distributed health care platform Journal title: Технологический аудит и резервы производства Authors: Anatolii Petrenko, Roman Kyslyi, Ihor Pysmennyi Subject(s):
Software Define Network Applications on Top of Blockchain Technology Journal title: International Journal of Academic Research in Business and Social Sciences Authors: Muhammad Johar Jaafar Subject(s):
TESTING NETWORK SECURITY USING KALI LINUX Journal title: Scientific Bulletin, Series: Electronics and Computer Science Authors: Nesh Amlani, Valeriu Ionescu Subject(s):
Routine of Encryption in Cognitive Radio Network Journal title: Mehran University Research Journal of Engineering and Technology Authors: A. Raza, M.T. Meeran, M. din Subject(s):
Internal Threat Defense using Network Access Control and Intrusion Prevention System Journal title: International Journal of Advanced Computer Science & Applications Authors: Andhika Surya Putra, Nico Surantha Subject(s):
Survey paper on intrusion detection techniques Journal title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Authors: Rachna Kulhare, Dr. Divakar Singh Subject(s):
Aggregating IDS Alerts Based on Time Threshold: Testing and Results Journal title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Authors: Homam Reda El-Taj Subject(s):
Comparative Study on Sybil Attack Detection Schemes Journal title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Authors: Salam Hamdan, Raad S. Al-Qassas, Sara Tedmori Subject(s):
State of Internet of Things (IoT) Security Attacks, Vulnerabilities and Solutions Journal title: Computer Reviews Journal Authors: Rosslin John Robles, Daisy Endencio-Robles Subject(s):
A Summary of Research on computer Network attack and Defense Modeling and Simulation Journal title: Computer System Networking and Telecommunications Authors: Ali J. Harriman, Alper Marshall Subject(s): Artificial Intelligence, Data Communication and Networks, Telecommunications, Computer Science, Cybernetics
Online security detection system design Journal title: Progress in Human Computer Interaction Authors: Hongyan Han,Zhongyuan Lu,Wenbing Wang Subject(s): Computer and Information Science, Computer-Human Interaction, Computer Science, Artificial Intelligence
Honeypot Methods and Applications Journal title: International Journal of Trend in Scientific Research and Development Authors: Anoop V Kanavi | Feon Jaison Subject(s): Biological Sciences, Computer and Information Science, Engineering, Mathematics, Agricultural Engineering, Management, Engineering, Multidisciplinary
An Assessment of Intrusion Detection System IDS and Data Set Overview A Comprehensive Review of Recent Works Journal title: International Journal of Trend in Scientific Research and Development Authors: Mohammed I. Alghamdi Subject(s): Biological Sciences, Computer and Information Science, Engineering, Mathematics, Agricultural Engineering, Management, Engineering, Multidisciplinary
Assessment of the effectiveness of the security features of personal wireless networks Journal title: Security and Defence Quarterly Authors: Janusz Gierszewski, Michał Marek Matuśkiewicz Subject(s): Social Sciences, Military Science, Social Sciences, Interdisciplinary, Social studies - Sociology
A CASE STUDY OF INDUSTRIAL CONTROL SYSTEM NETWORK SECURITY Journal title: Engineering and Technology Journal Authors: Michael Kinzel, Te-Shun Chou Subject(s): Engineering, Technology