Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Network security

Known as: LAN security, Secured network, Unsecured networks 
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2019
Review
2019
This paper presents a comprehensive literature review on applications of deep reinforcement learning (DRL) in communications and… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Review
2019
Review
2019
Software Defined Networking Technology (SDN) provides a prospect to effectively detect and monitor network security problems… Expand
Is this relevant?
Review
2019
Review
2019
Abstract The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which… Expand
Is this relevant?
Review
2019
Review
2019
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four main tasks are discussed first… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Is this relevant?
Review
2019
Review
2019
Vehicular ad hoc networks (VANETs) are becoming the most promising research topic in intelligent transportation systems, because… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2018
Review
2018
Keeping up with the burgeoning Internet of Things (IoT) requires staying up to date on the latest network attack trends in… Expand
  • figure 1
  • table 1
  • table 2
  • table 2
  • table 3
Is this relevant?
Review
2018
Review
2018
Emerging technologies such as the Internet of Things (IoT) require latency-aware computation for real-time application processing… Expand
Is this relevant?
Highly Cited
2015
Highly Cited
2015
This book includes the following chapters : Introduction; Mathematics of Cryptography; Traditional Symmetric-Key Ciphers… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
The classic guide to network securityi¾–now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… Expand
Is this relevant?