Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
Network segmentation
Known as:
Segmentation
Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Bridging (networking)
Collision domain
Cross-domain solution
Cybercrime
Expand
Broader (1)
Network architecture
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Mitigating cyberattack related domino effects in process plants via ICS segmentation
R. Arief
,
N. Khakzad
,
W. Pieters
Journal of Information Security and Applications
2020
Corpus ID: 213723845
Highly Cited
2018
Highly Cited
2018
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems
Aaron Zimba
,
Zhaoshun Wang
,
Hongsong Chen
ICT express
2018
Corpus ID: 64771810
Highly Cited
2015
Highly Cited
2015
The growth and evolution of DDoS
Steve Mansfield-Devine
Network Security
2015
Corpus ID: 31930779
Highly Cited
2013
Highly Cited
2013
EPIC: A Testbed for Scientifically Rigorous Cyber-Physical Security Experimentation
C. Siaterlis
,
B. Genge
,
M. Hohenadel
IEEE Transactions on Emerging Topics in Computing
2013
Corpus ID: 1096388
Recent malware, like Stuxnet and Flame, constitute a major threat to networked critical infrastructures (NCIs), e.g., power…
Expand
Review
2013
Review
2013
Enabling infrastructure as a service (IaaS) on IP networks: from distributed to virtualized control plane
K. Nguyen
,
M. Cheriet
IEEE Communications Magazine
2013
Corpus ID: 15137828
Infrastructure as a Service (IaaS) is considered a prominent model for IP based service delivery. As grid and cloud computing…
Expand
Highly Cited
2009
Highly Cited
2009
EtherProxy: Scaling Ethernet By Suppressing Broadcast Traffic
Khaled Elmeleegy
,
A. Cox
IEEE INFOCOM
2009
Corpus ID: 14795691
Ethernet is the dominant technology for local area networks. This is mainly because of its autoconfiguration capability and its…
Expand
2009
2009
Local Area Network Security
Pramod Pandya
2009
Corpus ID: 168549722
2009
2009
Locating network domain entry and exit point/path for DDoS attack traffic
V. Thing
,
M. Sloman
,
Naranker Dulay
IEEE Transactions on Network and Service…
2009
Corpus ID: 6618227
A method to determine entry and exit points or paths of DDoS attack traffic flows into and out of network domains is proposed. We…
Expand
2002
2002
Hierarchical network management: a scalable and dynamic mobile agent-based approach
D. Gavalas
,
D. Greenwood
,
M. Ghanbari
,
M. O'Mahony
Comput. Networks
2002
Corpus ID: 352431
1999
1999
Supporting Real-Time Distributed Computer-Controlled Systems with Multi-hop P-NET Networks
E. Tovar
,
F. Vasques
,
A. Burns
1999
Corpus ID: 55275075
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE