Journal articles on the topic 'Adaptive Network Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adaptive Network Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jesudoss, Sofiya, Auxeeliya Jesudoss, and Ashraph Sulaiman. "An Adaptive Approach to Improve the Accuracy of Packet Pre-Filtering." Advanced Materials Research 367 (October 2011): 241–48. http://dx.doi.org/10.4028/www.scientific.net/amr.367.241.
Full textKhan, Mohammad Tanveer. "MULTI LAYER ADAPTIVE NETWORK SECURITY APPROACH." International Journal of Advanced Research in Computer Science 9, no. 1 (2018): 75–78. http://dx.doi.org/10.26483/ijarcs.v9i1.5231.
Full textAlanazi, Meshari Huwaytim. "G-GANS for Adaptive Learning in Dynamic Network Slices." Engineering, Technology & Applied Science Research 14, no. 3 (2024): 14327–41. http://dx.doi.org/10.48084/etasr.7046.
Full textLiu, Xiao Wu, Hui Qiang Wang, Bao Xiang Cao, and Ji Guo Yu. "Network Security Situation Awareness Adaptive Control Model Based on Cognitive Network." Applied Mechanics and Materials 26-28 (June 2010): 952–55. http://dx.doi.org/10.4028/www.scientific.net/amm.26-28.952.
Full textHuang, Chang Wei, and Jin Quan Xiong. "Study of Campus Network Security Based on Dynamic Self-Adaptive Network Security Model." Advanced Materials Research 846-847 (November 2013): 1784–88. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1784.
Full textSharma, Jitender, Sonia, Karan Kumar, Pankaj Jain, Raed H. C. Alfilh, and Hussein Alkattan. "Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems." Mesopotamian Journal of CyberSecurity 5, no. 1 (2025): 1–10. https://doi.org/10.58496/mjcs/2025/001.
Full textRam, M. Sethu, and R. Anandan. "Enhanced Adaptive Security Algorithm (EASA) for optimized performance in smart city networks." Journal of Autonomous Intelligence 7, no. 5 (2024): 1372. http://dx.doi.org/10.32629/jai.v7i5.1372.
Full textC. Deepika. "Systematic Literature Review on VPN Security: Adaptive Multi-Tunnelling as a Mitigation Strategy." Journal of Information Systems Engineering and Management 10, no. 39s (2025): 760–77. https://doi.org/10.52783/jisem.v10i39s.7296.
Full textXiang, Ming, William Liu, Quan Bai, and Adnan Al-Anbuky. "The critical role of structural hole in forming trust for Securing Wireless Sensor Networks." International Journal of Information, Communication Technology and Applications 2, no. 1 (2016): 66–84. http://dx.doi.org/10.17972/ijicta20162127.
Full textWang, Yu Lin, and Jin Heng Wang. "Research on Security Technology of Campus Network." Advanced Materials Research 971-973 (June 2014): 1730–34. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1730.
Full textAhmad, Malik Basit, and Parul Agarwal. "Viability of Adaptive Network Security Exercising Tradeoff between Performance and Security." Recent Advances in Computer Science and Communications 13, no. 5 (2020): 893–900. http://dx.doi.org/10.2174/2213275912666190628100621.
Full textRAHMAN, Md Torikur, Mohammad ALAUDDIN, Uttam Kumar DEY, and Dr A. H. M. Saifullah SADI. "ADAPTIVE SECURE AND EFFICIENT ROUTING PROTOCOL FOR ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK." Applied Computer Science 19, no. 3 (2023): 133–59. http://dx.doi.org/10.35784/acs-2023-29.
Full textFan, Kai Qi. "Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent." Applied Mechanics and Materials 644-650 (September 2014): 2996–99. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2996.
Full textYang, Hongyu, Le Zhang, Xugao Zhang, and Jiyong Zhang. "An Adaptive IoT Network Security Situation Prediction Model." Mobile Networks and Applications 27, no. 1 (2021): 371–81. http://dx.doi.org/10.1007/s11036-021-01837-y.
Full textEl-Hajj, Mohammed. "Enhancing Communication Networks in the New Era with Artificial Intelligence: Techniques, Applications, and Future Directions." Network 5, no. 1 (2025): 1. https://doi.org/10.3390/network5010001.
Full textSharma, Ankita, and Vibhu Sharma. "APPLICATION OF GAME THEORY IN HIERARCHICAL NETWORK SECURITY." International Research Journal of Computer Science 08, no. 08 (2021): 221–26. http://dx.doi.org/10.26562/irjcs.2021.v0808.012.
Full textAslam, Muhammad, Dengpan Ye, Aqil Tariq, et al. "Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT." Sensors 22, no. 7 (2022): 2697. http://dx.doi.org/10.3390/s22072697.
Full textShahriyar, R. "ZERO TRUST ARCHITECTURE IN CORPORATE NETWORKS: A COMPARATIVE ANALYSIS OF IMPLEMENTATION STRATEGIES." Scientific heritage, no. 157 (March 25, 2025): 92–94. https://doi.org/10.5281/zenodo.15085558.
Full textAziz, Ahmed, and Sanjar Mirzaliev. "Optimizing Intrusion Detection Mechanisms for IoT Network Security." Journal of Cybersecurity and Information Management 13, no. 1 (2024): 60–68. http://dx.doi.org/10.54216/jcim.130106.
Full textZosimov, Vyacheslav V. "Enhancing Online Search Security Through Bayesian Trust Network Implementation." Control Systems and Computers, no. 1 (301) (April 1, 2023): 65–72. http://dx.doi.org/10.15407/csc.2023.01.065.
Full textWang, Yan Hua, and Xiu Xu. "Marking Certification of Adaptive Probability Packet Based on Hash Function." Advanced Materials Research 468-471 (February 2012): 2002–9. http://dx.doi.org/10.4028/www.scientific.net/amr.468-471.2002.
Full textLiu, Ding. "Research and Application of Hybrid Adaptive Forecasting Method Based on SOA." E3S Web of Conferences 213 (2020): 02007. http://dx.doi.org/10.1051/e3sconf/202021302007.
Full textKotenko, Igor Vitalievich, and Igor Borisovich Parashchuk. "Specific features of operational assessment of security of critical resources based on adaptive neural network filtering." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2023, no. 3 (2023): 55–64. http://dx.doi.org/10.24143/2072-9502-2023-3-55-64.
Full textApiecionek, Łukasz, and Matusz Biedziak. "Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection." JUCS - Journal of Universal Computer Science 26, no. (11) (2020): 1435–54. https://doi.org/10.3897/jucs.2020.076.
Full textKizin, V. S., and S. N. Novikov. "Improving video conference security in education." Interexpo GEO-Siberia 6 (May 18, 2022): 88–95. http://dx.doi.org/10.33764/2618-981x-2022-6-88-95.
Full textZhang, Fan, Xing Ming Zhang, and Ke Song. "Design of the Security Component in Reconfigurable Network." Advanced Materials Research 718-720 (July 2013): 2120–24. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.2120.
Full textP.B., Samiullah Khan, Ravi Teja Reddy G., and Selvameena R. "Detection and Localization of Adaptive Hierarchical Cyber Attacks in Active Distribution Systems." Detection and Localization of Adaptive Hierarchical Cyber Attacks in Active Distribution Systems 9, no. 2 (2024): 4. https://doi.org/10.5281/zenodo.10643084.
Full textKiran, Ajmeera, Prasad Mathivanan, Miroslav Mahdal, Kanduri Sairam, Deepak Chauhan, and Vamsidhar Talasila. "Enhancing Data Security in IoT Networks with Blockchain-Based Management and Adaptive Clustering Techniques." Mathematics 11, no. 9 (2023): 2073. http://dx.doi.org/10.3390/math11092073.
Full textSravani, Mrs P., K. Shiva Kumar, P. Jai Raj Sai, K. Mohan Aditya, and S. S. K. Chaitanya. "Botnet Attacks in Computer Network Security." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1826–34. https://doi.org/10.22214/ijraset.2025.67676.
Full textRaenu, Raenu, Suhas Gupta, Shashikant Patil, Jaymeel Shah, Abhinav Mishra, and N. Gobi. "Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems." Journal of Intelligent Systems and Internet of Things 13, no. 2 (2024): 35–51. http://dx.doi.org/10.54216/jisiot.130203.
Full textWahyono, Irawan Dwi, Djoko Saryono, Khoirudin Asfani, Muhammad Ashar, and Sunarti Sunarti. "Smart Online Courses Using Computational Intelligence." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (2020): 29. http://dx.doi.org/10.3991/ijim.v14i12.15601.
Full textShahzad, Muhammad K., S. M. Riazul Islam, Kyung-Sup Kwak, and Lewis Nkenyereye. "AEF: Adaptive En-Route Filtering to Extend Network Lifetime in Wireless Sensor Networks." Sensors 19, no. 18 (2019): 4036. http://dx.doi.org/10.3390/s19184036.
Full textMajeed, Abdul, Abdullah M. Alnajim, Athar Waseem, et al. "Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches." Future Internet 15, no. 6 (2023): 193. http://dx.doi.org/10.3390/fi15060193.
Full textMikryukov, A. A., A. V. Babash, and V. A. Sizov. "Classifcation of events in information security systems based on neural networks." Open Education 23, no. 1 (2019): 57–63. http://dx.doi.org/10.21686/1818-4243-2019-1-57-63.
Full textSharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.
Full textLi, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.
Full textG. Sharmila. "Decentralized And Adaptive Blockchain Based Offline Payment System Using Hardhat and Ethereum." Journal of Information Systems Engineering and Management 10, no. 44s (2025): 477–87. https://doi.org/10.52783/jisem.v10i44s.8614.
Full textSwapnil Chawande. "Adaptive zero trust with AI and Automation." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 751–63. https://doi.org/10.30574/wjaets.2024.13.2.0589.
Full textAgeev, Sergey, Vladimir Karetnikov, Evgeny Ol’khovik, and Andrey Privalov. "Adaptive method of detecting traffic anomalies in high-speed multi-service communication networks." E3S Web of Conferences 157 (2020): 04027. http://dx.doi.org/10.1051/e3sconf/202015704027.
Full textParveen Shaik, Dr Sajeeda. "Enhancing Cloud Computing Security Through Deep Learning: An Artificial Neural Network Approach." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 9, no. 4 (2021): 34–38. http://dx.doi.org/10.55083/irjeas.2021.v09i04009.
Full textASLAN, Ömer. "Ransomware Detection in Cyber Security Domain." Bitlis Eren Üniversitesi Fen Bilimleri Dergisi 11, no. 2 (2022): 509–19. http://dx.doi.org/10.17798/bitlisfen.1038966.
Full textЛисенко, Сергій Миколайович. "МЕТОД ЗАБЕЗПЕЧЕННЯ РЕЗИЛЬЄНТНОСТІ КОМП’ЮТЕРНИХ СИСТЕМ В УМОВАХ КІБЕРЗАГРОЗ НА ОСНОВІ САМОАДАПТИВНОСТІ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 4 (25 грудня 2019): 4–16. http://dx.doi.org/10.32620/reks.2019.4.01.
Full textUgbaja, Unomah Success, Uloma Stella Nwabekee, Wilfred Oseremen Owobu, and Olumese Anthony Abieba. "Conceptual Framework for Role-Based Network Access Management to Minimize Unauthorized Data Exposure Across IT Environments." International Journal of Social Science Exceptional Research 2, no. 1 (2023): 211–21. https://doi.org/10.54660/ijsser.2023.2.1.211-221.
Full textDomb, Menachem, Balaji C. G., Menaka S., Gayathri A., and Sujata Joshi. "Securing 5G Networks by Mitigating Cybersecurity Risks for Transformative Applications." International Journal of Interactive Mobile Technologies (iJIM) 19, no. 11 (2025): 227–55. https://doi.org/10.3991/ijim.v19i11.54519.
Full textTanriverdiyev, E. "SECURING MILITARY CYBERSPACE: A DETAILED ANALYSIS OF THREAT VECTORS AND STRATEGIC SOLUTIONS FOR BATTLEFIELD NETWORKS." Slovak international scientific journal, no. 89 (November 15, 2024): 11–13. https://doi.org/10.5281/zenodo.14167013.
Full textKotov, O. "METHODOLOGICAL FRAMEWORK FOR ASSESSING ENTERPRISE COMPETITIVENESS." Slovak international scientific journal, no. 89 (November 15, 2024): 14–18. https://doi.org/10.5281/zenodo.14167017.
Full textKonika Abid. "Adaptive Random Mac Strategy for IoT Security Through Network Forensics Investigation." Journal of Electrical Systems 20, no. 7s (2024): 1740–48. http://dx.doi.org/10.52783/jes.3774.
Full textYuan, Hao. "A Network Security Risk Assessment Method Based on Immunity Algorithm." Advanced Materials Research 108-111 (May 2010): 948–53. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.948.
Full textRajalakshmi, N. R., Sathishkumar V. E., C. Kannika Parameshwari, Maheshwari V., and Prasanna M. "Cyber-security attack prediction using cognitive spectral clustering technique based on simulated annealing search." Applied and Computational Engineering 6, no. 1 (2023): 1368–73. http://dx.doi.org/10.54254/2755-2721/6/20230791.
Full textAsaad, Maha Salah, and Muayad Sadik Croock. "Adaptive security approach for wireless sensor network using RSA algorithm." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 361. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp361-368.
Full text