Network security

Known as: LAN security, Secured network, Unsecured networks 
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
OpenFlow is an open standard that has gained tremendous interest in the last few years within the network community. It is an… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The field of network and Internet security consists of measures to deter, prevent, detect, and correct security violations that… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Cyber Security is a complex field that draws applications from variety of theoretical areas. This book is a Decision and Game… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
To determine the security impact software vulnerabilities have on a particular network, one must consider interactions among… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
If you want to possess a one-stop search and find the proper manuals on your products, you can visit this website that delivers… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The… (More)
  • figure 2
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Even well administered networks are vulnerable to attack. Recent work in network security has focused on the fact that… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Devices in mobile ad hoc networks work as network nodes and relay packets originated by other nodes. Mobile ad hoc networks can… (More)
  • figure 1
  • figure 4
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Executive Summary Confidentiality, integrity, and authentication services are critical to preventing an adversary from… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of… (More)
  • figure 3
  • figure 8
Is this relevant?