Academic literature on the topic 'Network security technologies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network security technologies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network security technologies"
VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.
Full textSourour, Meharouech, Bouhoula Adel, and Abbes Tarek. "Ensuring security in depth based on heterogeneous network security technologies." International Journal of Information Security 8, no. 4 (2009): 233–46. http://dx.doi.org/10.1007/s10207-009-0077-2.
Full textBell Bitjoka, Georges, and Antoine Elang. "Network Malware Laboratory BasedOn Honeypots Technologies." Journal of Cybersecurity Research (JCR) 3, no. 1 (2018): 1–12. http://dx.doi.org/10.19030/jcr.v3i1.10226.
Full textHuang, Chang Wei, and Jin Quan Xiong. "Study of Campus Network Security Based on Dynamic Self-Adaptive Network Security Model." Advanced Materials Research 846-847 (November 2013): 1784–88. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1784.
Full textLi, Yi, Dong Liu, Bo Wang, and Xin Ming Li. "Research on Authentication-Based Security Technology for Complex Networks." Applied Mechanics and Materials 232 (November 2012): 701–5. http://dx.doi.org/10.4028/www.scientific.net/amm.232.701.
Full textYang, Qiuwei, Xiaogang Zhu, Hongjuan Fu, and Xiqiang Che. "Survey of Security Technologies on Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/842392.
Full textHuang, Yong, Jian Hua Zhu, and Hui Li. "General Discussion on Prevention Technologies of Network Security." Applied Mechanics and Materials 347-350 (August 2013): 3307–11. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3307.
Full textWang, Xiu Ping. "Application of IOT Technologies in Campus Security System." Advanced Materials Research 268-270 (July 2011): 1884–87. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1884.
Full textYamamoto, Kinko. "Summary of Security Technologies for Information Network Systems." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 810–15. http://dx.doi.org/10.1541/ieejeiss1987.107.9_810.
Full textXiang, Yang, Ahmed Al-Dubi, Lei Liu, and Xiaowen Chu. "Frontier technologies of trust computing and network security." Concurrency and Computation: Practice and Experience 27, no. 12 (2015): 2907–9. http://dx.doi.org/10.1002/cpe.3458.
Full textDissertations / Theses on the topic "Network security technologies"
Duarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.
Full textKalibjian, Jeff. "AN UPDATE ON NETWORK-BASED SECURITY TECHNOLOGIES APPLICABLE TO TELEMETRY POST-PROCESSING AND ANALYSIS ACTIVITIES." International Foundation for Telemetering, 2007. http://hdl.handle.net/10150/604578.
Full textPelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.
Full textDaniels, Anton. "Information Security in an Internet of Things Network Based on Blockchains and User Participation." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74757.
Full textSirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.
Full textSuárez, Trujillo Luis Carlos. "Securing network slices in 5th generation mobile networks." Thesis, Brest, 2020. http://www.theses.fr/2020BRES0050.
Full textBekara, Chakib. "Wireless sensor network security." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0020.
Full textFana, Akhona. "An evaluation of security issues in cloud-based file sharing technologies." Thesis, University of Fort Hare, 2015. http://hdl.handle.net/10353/1841.
Full textElgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.
Full textBoutigny, François. "Multidomain virtual network embedding under security-oriented requirements applied to 5G network slices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAS002.
Full textBooks on the topic "Network security technologies"
Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.
Find full textBhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.
Find full textAmine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.
Find full textHoffman, Daniel. Implementing NAP and NAC Security Technologies. John Wiley & Sons, Ltd., 2008.
Find full textNetwork security, administration, and management: Advancing technologies and practice. Information Science Reference, 2011.
Find full textSecurity, design, and architecture for broadband and wireless network technologies. Information Science Reference, 2013.
Find full textHoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.
Find full textHoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.
Find full textInternational MCETCH Conference on e-Technologies (3rd 2008 Montreal, Que.). 2008 International MCETCH Conference on e-Technologies: 23-25 January, 2008, Montreal, Quebec, Canada : proceedings. IEEE Computer Society, 2007.
Find full textWho might be lurking at your cyber front door? Is your system really secure?: Strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. U.S. G.P.O., 2004.
Find full textBook chapters on the topic "Network security technologies"
Zhang, Hongke, Wei Su, and Wei Quan. "Security Technologies of SINET." In Smart Collaborative Identifier Network. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49143-0_10.
Full textCamenisch, Jan, and Anton Mityagin. "Mix-Network with Stronger Security." In Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_9.
Full textChakraborty, Mohuya, and Moutushi Singh. "Introduction to Network Security Technologies." In The "Essence" of Network Security: An End-to-End Panorama. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9317-8_1.
Full textChen, Lei. "Applications, Technologies, and Standards in Secure Wireless Networks and Communications." In Wireless Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_1.
Full textRay, Niranjan K., Biswaranjan Acharya, and Anil Kumar Swain. "Network Big Data Security Issues." In Encyclopedia of Big Data Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77525-8_240.
Full textRay, Niranjan K., Biswaranjan Acharya, and Anil Kumar Swain. "Network Big Data Security Issues." In Encyclopedia of Big Data Technologies. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63962-8_240-1.
Full textShen, Ningguo, Bin Yu, Mingxiang Huang, and Hailin Xu. "E2E Network Security on an Intent-Driven Campus Network." In Campus Network Architectures and Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003143314-8.
Full textThakare, Sheetal, Anshuman Pund, and M. A. Pund. "Network Security: Approach Based on Network Traffic Prediction." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_5.
Full textSheng, Cheng, Jie Bai, and Qi Sun. "Security: Top Priority." In Software-Defined Wide Area Network Architectures and Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003144038-7.
Full textPapakonstantinou, Ioannis, and Nicolas Sklavos. "Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_24.
Full textConference papers on the topic "Network security technologies"
Lee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.
Full textZhen Wang, Zhijie Liu, and Xiaoyao Xie. "The research of network security technologies." In 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5277012.
Full textPei, Xu. "Analysis of Network Attack Technologies and Network Security." In 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/emcm-16.2017.22.
Full textStotts, Larry B., and John G. Allen. "Networking: technologies and challenges for network-centric operations." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.548185.
Full textSpannenburg, Sybrand. "Machine-detectable copying security elements." In Advanced Imaging and Network Technologies, edited by Jan Bares, Christopher T. Bartlett, Paul A. Delabastita, et al. SPIE, 1997. http://dx.doi.org/10.1117/12.266327.
Full textAvedyan, Eduard, Alexander Galushkin, and Dmitry Pantiukhin. "Neural network technologies for information systems security." In 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). IEEE, 2014. http://dx.doi.org/10.1109/cisda.2014.7035632.
Full textChoudhary, Abdur Rahim, and Alan Sekelsky. "Securing IPv6 network infrastructure: A new security model." In 2010 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2010. http://dx.doi.org/10.1109/ths.2010.5654971.
Full textFarquharson, J., A. Wang, and J. Howard. "Smart Grid Cyber Security and substation Network Security." In 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). IEEE, 2012. http://dx.doi.org/10.1109/isgt.2012.6175788.
Full textFaujdar, Neetu, Aparna Sinha, Harsh Sharma, and Eshaan Verma. "Network Security in Software defined Networks (SDN)." In 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE, 2020. http://dx.doi.org/10.1109/icstcee49637.2020.9277300.
Full textSmeliansky, R. L. "SDN for network security." In 2014 International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC). IEEE, 2014. http://dx.doi.org/10.1109/monetec.2014.6995602.
Full textReports on the topic "Network security technologies"
Hurd, Steven A., Jason Edwin Stamp, David P. Duggan, and Adrian R. Chavez. Applying New Network Security Technologies to SCADA Systems. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/1137212.
Full textSayers, Dave, Rui Sousa-Silva, Sviatlana Höhn, et al. The Dawn of the Human-Machine Era: A forecast of new and emerging language technologies. Open Science Centre, University of Jyväskylä, 2021. http://dx.doi.org/10.17011/jyx/reports/20210518/1.
Full text