Skip to search formSkip to main contentSkip to account menu

Network security

Known as: LAN security, Secured network, Unsecured networks 
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Wireless sensor network swears an exceptional fine-grained interface between the virtual and physical worlds. The clustering… 
2012
2012
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health… 
2011
2011
SkyNET is a stealth network that connects hosts to a bot-master through a mobile drone. The network is comprised of machines on… 
Highly Cited
2009
Highly Cited
2009
††† † † Summary This paper presents a novel technique for embedding a binary logo watermark into video frames. The proposed… 
Highly Cited
2008
Highly Cited
2008
†Summary This paper proposed a novel image scrambling scheme based on chaos theory and the sorting transformation. The new… 
Highly Cited
2008
Highly Cited
2008
Bloom filters are efficient randomized data structures for membership queries on a set with a certain known false positive… 
Highly Cited
2008
Highly Cited
2008
In this paper Internet backbone traffic is classified on transport layer according to network applications. Classification is… 
Highly Cited
2002
Highly Cited
2002
Software quality is no better today than it was decades ago. In some cases, it's worse. A look at the past may help us change the…