8 results for network security.

Parameters for your search query:
Keyword    network security

Open AccessReview Article
Export: RIS | BibTeX | EndNote
Big Data in Intrusion Detection Systems and Intrusion Prevention Systems
Journal of Computer Networks. 2017, 4(1), 48-55. DOI: 10.12691/jcn-4-1-5
Pub. Date: August 19, 2017Views: 7835Downloads: 6676
Open AccessArticle
Export: RIS | BibTeX | EndNote
A Security Scheme to Mitigate Denial of Service Attacks in Delay Tolerant Networks
Journal of Computer Sciences and Applications. 2017, 5(2), 50-63. DOI: 10.12691/jcsa-5-2-2
Pub. Date: June 30, 2017Views: 2793Downloads: 2064
Open AccessReview Article
Export: RIS | BibTeX | EndNote
A Survey on Secure Network: Intrusion Detection & Prevention Approaches
American Journal of Information Systems. 2016, 4(3), 69-88. DOI: 10.12691/ajis-4-3-2
Pub. Date: December 03, 2016Views: 9444Downloads: 7386
Open AccessArticle
Export: RIS | BibTeX | EndNote
Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey
Information Security and Computer Fraud. 2015, 3(1), 1-7. DOI: 10.12691/iscf-3-1-1
Pub. Date: June 23, 2015Views: 16063Downloads: 13428
Open AccessArticle
Export: RIS | BibTeX | EndNote
Multilevel Network Security Combining Cryptography and Steganography on ARM Platform
Journal of Embedded Systems. 2015, 3(1), 11-15. DOI: 10.12691/jes-3-1-2
Pub. Date: March 22, 2015Views: 8631Downloads: 7239
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Big Data in Network Security Systems
International Transaction of Electrical and Computer Engineers System. 2017, 4(2), 68-74. DOI: 10.12691/iteces-4-2-4
Pub. Date: December 16, 2017Views: 1169Downloads: 1084
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Selection of Fittest Key Using Genetic Algorithm and Autocorrelation in Cryptography
Journal of Computer Sciences and Applications. 2015, 3(2), 46-51. DOI: 10.12691/jcsa-3-2-5
Pub. Date: April 23, 2015Views: 8085Downloads: 6404
This article belongs to the Special Issue Applicability of Soft Computing in NP Hard Problems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Review on Network Security and Cryptography
International Transaction of Electrical and Computer Engineers System. 2015, 3(1), 1-11. DOI: 10.12691/iteces-3-1-1
Pub. Date: March 24, 2015Views: 17510Downloads: 10403Citations: 13
This article belongs to the Special Issue Special issue on Cryptography & Network Security
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects


Journals






Article Types