Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,454 papers from all fields of science
Search
Sign In
Create Free Account
Network security
Known as:
LAN security
, Secured network
, Unsecured networks
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application firewall
Argus - Audit Record Generation and Utilization System
Authentication
BadBIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
Highly Cited
2011
Highly Cited
2011
Peformance analysis of data encryption algorithms
O. Verma
,
R. Agarwal
,
Dhiraj Dafouti
,
Shobha Tyagi
International Conference on Electronic Computer…
2011
Corpus ID: 14643681
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all…
Expand
Review
2010
Review
2010
Broadcasting safety information in vehicular networks: issues and approaches
Rex Chen
,
W. Jin
,
A. Regan
IEEE Network
2010
Corpus ID: 1155967
A primary goal of intelligent transportation systems is to improve road safety. The ability of vehicles to communicate is a…
Expand
Highly Cited
2009
Highly Cited
2009
Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform
S. A. Mostafa
,
A. S. Tolba
,
F. M. Abdelkader
,
H. M. Elhindy
2009
Corpus ID: 16450978
††† † † Summary This paper presents a novel technique for embedding a binary logo watermark into video frames. The proposed…
Expand
Highly Cited
2009
Highly Cited
2009
Performance Analysis of Multimodal Biometric System Authentication
George Chellin
2009
Corpus ID: 44522955
Traditional identity verification in computer systems are done based on Knowledge based and token based identification these are…
Expand
Highly Cited
2007
Highly Cited
2007
Security-Constrained Resource Planning in Electricity Markets
J. Roh
,
M. Shahidehpour
,
Yong Fu
IEEE Transactions on Power Systems
2007
Corpus ID: 7711665
We propose a security-based competitive generation resource planning model in electricity markets. The objective of the model is…
Expand
Highly Cited
2006
Highly Cited
2006
A Methodology to Develop Secure Systems Using Patterns
E. Fernández
,
Maria Mercedes Larrondo-Petrie
,
Tami Sorgente
,
M. VanHilst
2006
Corpus ID: 64185449
We are developing a methodology to build secure software for complex applications and its related support. This methodology…
Expand
Highly Cited
2004
Highly Cited
2004
On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops
D. Cáceres
,
Juan Pastor Franco
,
María Bárbara Álvarez Torres
Lecture Notes in Computer Science
2004
Corpus ID: 5564149
This work was supported in part by the Spanish Ministry of Education (with reference ACF2000{0037{IN) and the Regional…
Expand
Highly Cited
2004
Highly Cited
2004
Attribute Mutability in Usage Control
Jaehong Park
,
Xinwen Zhang
,
R. Sandhu
Database Security
2004
Corpus ID: 15806644
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision…
Expand
Highly Cited
2001
Highly Cited
2001
A multipath routing approach for secure data delivery
Wenjing Lou
,
Yuguang Fang
MILCOM Proceedings Communications for Network…
2001
Corpus ID: 3122517
In this paper, we propose a novel approach to enhance data confidentiality when transmitting across insecure networks. The idea…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE