-
1
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01Subjects: “…RPA;network security operation automation platform;network security policy management;network security operation system;network security…”
Get full text
Article -
2
Application research on network security operation automation practice based on RPA technology
Published 2024-07-01Subjects: Get full text
Article -
3
Design of Detection and Prevention System of Unauthorized Data Sending from the Local Network
Published 2010-03-01Subjects: Get full text
Article -
4
A network security situation prediction method based on hidden Markov model
Published 2015-12-01Subjects: “…network security situation prediction;hidden Markov model;regularization;network security…”
Get full text
Article -
5
Key management scheme of distributed IoT devices based on blockchains
Published 2023-07-01Subjects: Get full text
Article -
6
A network security situation prediction method based on hidden Markov model
Published 2015-12-01Subjects: Get full text
Article -
7
Survey on network security based on blockchain
Published 2018-03-01Subjects: “…network security…”
Get full text
Article -
8
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Published 2021-05-01Subjects: Get full text
Article -
9
Survey on network security based on blockchain
Published 2018-03-01Subjects: “…network security;privacy;blockchain…”
Get full text
Article -
10
A Dynamic Rule Creation Based Anomaly Detection Method for Identifying Security Breaches in Log Records
Published 2016Subjects: “…Network security…”
Get full text
Get full text
Journal Article -
11
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
Published 2011Subjects: “…Computer network - Security measures…”
Get full text
Thesis -
12
Artificial intelligence based optimization for mapping IP addresses to prevent cyber-based attacks
Published 2022-12-01Subjects: Get full text
Article -
13
A Network Security Situation Element Extraction Method Based on Conditional Generative Adversarial Network and Transformer
Published 2022-01-01Subjects: “…Network security…”
Get full text
Article -
14
-
15
Study on modern malware analysis system
Published 2014-10-01Subjects: “…network security;malware;automated analysis…”
Get full text
Article -
16
-
17
LDoS attack detection method based on traffic classification prediction
Published 2022-03-01Subjects: “…computer network security…”
Get full text
Article -
18
MDS coding enabled proxy‐based Internet censorship circumvention system
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
19
A behavioural in‐depth analysis of ransomware infection
Published 2021-01-01Subjects: Get full text
Article -
20
A survey of firewall technology based on image content filtering
Published 2003-01-01Subjects: “…firewall;image content;network security…”
Get full text
Article