Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,856 papers from all fields of science
Search
Sign In
Create Free Account
Intranet
Known as:
Intra Net
, Internal network
, Private IP network
Expand
An intranet is a private network accessible only to an organization's staff. Generally a wide range of information and services from the organization…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acid2
ActiveMovie
Adobe ColdFusion
Ametys CMS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2011
Review
2011
Membrane-based biomolecular smart materials
S. A. Sarles
,
D. Leo
2011
Corpus ID: 96423372
Membrane-based biomolecular materials are a new class of smart material that feature networks of artificial lipid bilayers…
Expand
Highly Cited
2009
Highly Cited
2009
A hierarchical design of case-based reasoning in the balanced scorecard application
Fong-Ching Yuan
,
C. Chiu
Expert systems with applications
2009
Corpus ID: 9321563
Highly Cited
2006
Highly Cited
2006
A primary and backup cooperative protection system based on wide area agents
Renan Giovanini
,
K. Hopkinson
,
D. Coury
,
J. S. Thorp
IEEE Transactions on Power Delivery
2006
Corpus ID: 37089773
This paper presents a study of wide area agents based on communication for primary and backup coordinated protection. Agents are…
Expand
Review
2005
Review
2005
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite
W. Yurcik
LiSA
2005
Corpus ID: 4070526
The first step in improving Internet security is measurement - security events must be made visible. The irony in making this…
Expand
Highly Cited
2002
Highly Cited
2002
Multicast-based loss inference with missing data
N. Duffield
,
J. Horowitz
,
D. Towsley
,
Wei Wei
,
T. Friedman
IEEE J. Sel. Areas Commun.
2002
Corpus ID: 6673268
Network tomography using multicast probes enables inference of loss characteristics of internal network links from reports of end…
Expand
Highly Cited
2000
Highly Cited
2000
Best practice transfer for future competitiveness: A study of best practices
Y. Jarrar
,
M. Zairi
2000
Corpus ID: 55432639
Benchmarking or best practice management is increasingly being recognized as a powerful performance improvement eVort for…
Expand
2000
2000
Combining Cisco NetFlow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics
B. Nickless
,
J. Navarro
,
L. Winkler
LiSA
2000
Corpus ID: 12253564
Argonne National Laboratory operates a complex internal network with a large number of external network peerings. A requirement…
Expand
1999
1999
Software smart cards via cryptographic camouflage
D. N. Hoover
,
B. N. Kausik
Proceedings of the IEEE Symposium on Security…
1999
Corpus ID: 7473159
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys…
Expand
1999
1999
Virtual Private Networks Identifier
Barbara A. Fox
,
B. Gleeson
Request for Comments
1999
Corpus ID: 39175490
Virtual Private IP networks may span multiple Autonomous Systems or Service Providers. There is a requirement for the use of a…
Expand
Highly Cited
1998
Highly Cited
1998
Internet And Intranet Security
R. Oppliger
,
Artech House
1998
Corpus ID: 167318399
From the Publisher: Here is a comprehensive, crystal clear examination into the latest techniques and mechanisms used to help…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE