Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,301 papers from all fields of science
Search
Sign In
Create Free Account
Network security
Known as:
LAN security
, Secured network
, Unsecured networks
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application firewall
Argus - Audit Record Generation and Utilization System
Authentication
BadBIOS
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
Review
2012
Review
2012
Comparison of Residual Energy-Based Clustering Algorithms for Wireless Sensor Network
A. Tripathy
,
S. Chinara
2012
Corpus ID: 55023500
Wireless sensor network swears an exceptional fine-grained interface between the virtual and physical worlds. The clustering…
Expand
2012
2012
Enhancing accountability of electronic health record usage via patient-centric monitoring
D. Mashima
,
M. Ahamad
International Health Informatics Symposium
2012
Corpus ID: 5995896
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health…
Expand
2011
2011
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster
Theodore Reed
,
Joseph Geis
,
S. Dietrich
Workshop on Offensive Technologies
2011
Corpus ID: 7016333
SkyNET is a stealth network that connects hosts to a bot-master through a mobile drone. The network is comprised of machines on…
Expand
Highly Cited
2009
Highly Cited
2009
Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform
S. A. Mostafa
,
A. S. Tolba
,
F. M. Abdelkader
,
H. M. Elhindy
2009
Corpus ID: 16450978
††† † † Summary This paper presents a novel technique for embedding a binary logo watermark into video frames. The proposed…
Expand
Highly Cited
2008
Highly Cited
2008
Image Scrambling Algorithm Based on Chaos Theory and Sorting Transformation
Xiangdong Liu
,
Junxing Zhang
,
Jinhai Zhang
,
He Xiqin
2008
Corpus ID: 14419123
†Summary This paper proposed a novel image scrambling scheme based on chaos theory and the sorting transformation. The new…
Expand
Highly Cited
2008
Highly Cited
2008
MultiLayer Compressed Counting Bloom Filters
D. Ficara
,
S. Giordano
,
G. Procissi
,
F. Vitucci
IEEE INFOCOM - The 27th Conference on Computer…
2008
Corpus ID: 5637829
Bloom filters are efficient randomized data structures for membership queries on a set with a certain known false positive…
Expand
Highly Cited
2008
Highly Cited
2008
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns
Wolfgang John
,
S. Tafvelin
International Conference on Information…
2008
Corpus ID: 11865159
In this paper Internet backbone traffic is classified on transport layer according to network applications. Classification is…
Expand
2007
2007
Quality of data model for supporting mobile decision making
J. Cowie
,
F. Burstein
Decision Support Systems
2007
Corpus ID: 13888718
Highly Cited
2002
Highly Cited
2002
50 years of software: key principles for quality
James A. Whittaker
,
J. Voas
2002
Corpus ID: 42135884
Software quality is no better today than it was decades ago. In some cases, it's worse. A look at the past may help us change the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE