Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,973,667 papers from all fields of science
Search
Sign In
Create Free Account
Network security
Known as:
LAN security
, Secured network
, Unsecured networks
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application firewall
Argus - Audit Record Generation and Utilization System
Authentication
BadBIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Cryptography and Network Security
Behrouz A. Forouzan
2015
Corpus ID: 58607262
This book includes the following chapters : Introduction; Mathematics of Cryptography; Traditional Symmetric-Key Ciphers…
Expand
Review
2013
Review
2013
Game theory meets network security and privacy
M. Manshaei
,
Quanyan Zhu
,
T. Alpcan
,
T. Başar
,
J. Hubaux
CSUR
2013
Corpus ID: 207203993
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication…
Expand
Review
2010
Review
2010
A Survey of Game Theory as Applied to Network Security
Sankardas Roy
,
Charles Ellis
,
S. Shiva
,
D. Dasgupta
,
Vivek Shandilya
,
C. Wu
Hawaii International Conference on System…
2010
Corpus ID: 206704197
Network security is a complex and challenging problem. The area of network defense mechanism design is receiving immense…
Expand
Review
2009
Review
2009
Sensor network security: a survey
Xiangqian Chen
,
K. Makki
,
K. Yen
,
N. Pissinou
IEEE Communications Surveys and Tutorials
2009
Corpus ID: 1940388
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in…
Expand
Review
2006
Review
2006
Wireless Sensor Network Security: A Survey
J. Walters
,
Zhengqiang Liang
,
Weisong Shi
,
V. Chaudhary
2006
Corpus ID: 8598820
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may…
Expand
Highly Cited
2005
Highly Cited
2005
MulVAL: A Logic-based Network Security Analyzer
Xinming Ou
,
Sudhakar Govindavajhala
,
A. Appel
USENIX Security Symposium
2005
Corpus ID: 2679804
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among…
Expand
Highly Cited
2002
Highly Cited
2002
Network security - private communication in a public world
C. Kaufman
,
R. Perlman
,
M. Speciner
Prentice Hall series in computer networking and…
2002
Corpus ID: 37316854
The classic guide to network securityi¾now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet…
Expand
Review
1999
Review
1999
Network Security Essentials: Applications and Standards
W. Stallings
1999
Corpus ID: 60759307
From the Book: PREFACE: Preface In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and…
Expand
Review
1998
Review
1998
Cryptography and Network Security: Principles and Practice
W. Stallings
1998
Corpus ID: 61678531
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and…
Expand
Highly Cited
1990
Highly Cited
1990
A network security monitor
L. T. Herberlein
,
Gihan V. Dias
,
K. Levitt
,
B. Mukherjee
,
J. Wood
,
David Wolber
Proceedings. IEEE Computer Society Symposium on…
1990
Corpus ID: 12930051
This study concentrates on the security-related issues in a single broadcast LAN (local area network) such as Ethernet. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE