Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Network security

Known as: LAN security, Secured network, Unsecured networks 
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
This book includes the following chapters : Introduction; Mathematics of Cryptography; Traditional Symmetric-Key Ciphers… Expand
Review
2013
Review
2013
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication… Expand
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Review
2009
Review
2009
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2006
Review
2006
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may… Expand
  • table I
  • figure 1
  • table II
  • figure 2
Review
2006
Review
2006
The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of… Expand
  • figure 1
  • table 1
  • table 2
Highly Cited
2005
Highly Cited
2005
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among… Expand
  • figure 1
  • figure 2
  • figure 3
Review
1999
Review
1999
From the Book: PREFACE: Preface In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and… Expand
Review
1998
Review
1998
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and… Expand
Highly Cited
1995
Highly Cited
1995
The classic guide to network securityi¾–now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… Expand
Highly Cited
1990
Highly Cited
1990
This study concentrates on the security-related issues in a single broadcast LAN (local area network) such as Ethernet. The… Expand