Skip to search formSkip to main contentSkip to account menu

Network security

Known as: LAN security, Secured network, Unsecured networks 
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all… 
Review
2010
Review
2010
A primary goal of intelligent transportation systems is to improve road safety. The ability of vehicles to communicate is a… 
Highly Cited
2009
Highly Cited
2009
††† † † Summary This paper presents a novel technique for embedding a binary logo watermark into video frames. The proposed… 
Highly Cited
2009
Highly Cited
2009
Traditional identity verification in computer systems are done based on Knowledge based and token based identification these are… 
Highly Cited
2007
Highly Cited
2007
We propose a security-based competitive generation resource planning model in electricity markets. The objective of the model is… 
Highly Cited
2006
Highly Cited
2006
We are developing a methodology to build secure software for complex applications and its related support. This methodology… 
Highly Cited
2004
Highly Cited
2004
This work was supported in part by the Spanish Ministry of Education (with reference ACF2000{0037{IN) and the Regional… 
Highly Cited
2004
Highly Cited
2004
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision… 
Highly Cited
2001
Highly Cited
2001
In this paper, we propose a novel approach to enhance data confidentiality when transmitting across insecure networks. The idea…