Academic literature on the topic 'Network security technologies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network security technologies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network security technologies"

1

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or th
APA, Harvard, Vancouver, ISO, and other styles
2

Sourour, Meharouech, Bouhoula Adel, and Abbes Tarek. "Ensuring security in depth based on heterogeneous network security technologies." International Journal of Information Security 8, no. 4 (2009): 233–46. http://dx.doi.org/10.1007/s10207-009-0077-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bell Bitjoka, Georges, and Antoine Elang. "Network Malware Laboratory BasedOn Honeypots Technologies." Journal of Cybersecurity Research (JCR) 3, no. 1 (2018): 1–12. http://dx.doi.org/10.19030/jcr.v3i1.10226.

Full text
Abstract:
According to studies conducted by researchers across the globe, in recent years there has been an increase in organization and company attacks. Some attacks have been detected, but others, however, were able to bypass the security mechanisms, taking advantage of an unknown vulnerability in security systems. In this context, Honeypots systems aim to collect information on the intruder’s activities and learn about threats and attackers’ behavior. Honeypots systems are not designed to remedy failures or security errors on the network, but are responsible for providing adequate information on pote
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Chang Wei, and Jin Quan Xiong. "Study of Campus Network Security Based on Dynamic Self-Adaptive Network Security Model." Advanced Materials Research 846-847 (November 2013): 1784–88. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1784.

Full text
Abstract:
Taking dynamic self-adaptive network security model system of the whole network as theoretical guidance, this thesis analyzes security risks faced by campus network completely and in full detail, combining with the network system features. The current mainstream of network security technologies such as firewalls, intrusion detection,VPN, certification, and others are carefully studied to illustrate security technologies which shall be focused for the campus network security. Then, taking the Jiangxi Science and Technology Normal University campus network as an example, the specific characteris
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Yi, Dong Liu, Bo Wang, and Xin Ming Li. "Research on Authentication-Based Security Technology for Complex Networks." Applied Mechanics and Materials 232 (November 2012): 701–5. http://dx.doi.org/10.4028/www.scientific.net/amm.232.701.

Full text
Abstract:
The concept of authentication network is proposed to solve the security problems of complex network. The basic idea of authentication network is to ensure that everything of network must be authenticated. The technologies about authentication node, including the trusted root and trusted chain are studied. The security technologies about authentication networks, including trusted transmission, distributed and tree authentication management, multistage and multilayer access control strategy are also researched. At last, the security abilities of authentication network are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Qiuwei, Xiaogang Zhu, Hongjuan Fu, and Xiqiang Che. "Survey of Security Technologies on Wireless Sensor Networks." Journal of Sensors 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/842392.

Full text
Abstract:
Because of their low cost and adaptability, wireless sensor networks are widely used in civil, military, and commercial fields and other fields. However, since the sensor node in the calculation of the capacity, battery capacity, and storage capacity are restricted by the limitations and inherent characteristics of the sensor networks, compared to traditional networks, which makes wireless sensor networks face more security threats. This paper summarized research progress of sensor network security issues as three aspects, key management, authentication, and secure routing, analyzed and commen
APA, Harvard, Vancouver, ISO, and other styles
7

Huang, Yong, Jian Hua Zhu, and Hui Li. "General Discussion on Prevention Technologies of Network Security." Applied Mechanics and Materials 347-350 (August 2013): 3307–11. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3307.

Full text
Abstract:
Definition of network security is stated first. Network security threats; roughly including network connection threat, physical environment threat, authentication treat, malicious programs and system vulnerabilities, which can be further divided into more detailed categories. 8 prevention technology and strategies consisting of physical security means, firewall technology, intrusion detection, information encryption technology, vulnerability scanning, antivirus software, disaster recovery technology, and honeypots and honeynet technology are elaborated to try to form a general discussion of th
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiu Ping. "Application of IOT Technologies in Campus Security System." Advanced Materials Research 268-270 (July 2011): 1884–87. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1884.

Full text
Abstract:
This paper puts forward an application of IOT technologies in campus security,such as the RFID, wireless sensor networks, Zigbee,and so on, and designs an integrative campus security system including RFID application system, network video monitoring system and fire alarm system, etc. It will contribute to build “safe campus” and “intelligent campus”, and resolve the serious situation facing the campus safety.
APA, Harvard, Vancouver, ISO, and other styles
9

Yamamoto, Kinko. "Summary of Security Technologies for Information Network Systems." IEEJ Transactions on Electronics, Information and Systems 107, no. 9 (1987): 810–15. http://dx.doi.org/10.1541/ieejeiss1987.107.9_810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiang, Yang, Ahmed Al-Dubi, Lei Liu, and Xiaowen Chu. "Frontier technologies of trust computing and network security." Concurrency and Computation: Practice and Experience 27, no. 12 (2015): 2907–9. http://dx.doi.org/10.1002/cpe.3458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Network security technologies"

1

Duarte, Coscia Bruno Marcel. "Evaluation of Network-Layer Security Technologies for Cloud Platforms." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-290293.

Full text
Abstract:
With the emergence of cloud-native applications, the need to secure networks and services creates new requirements concerning automation, manageability, and scalability across data centers. Several solutions have been developed to overcome the limitations of the conventional and well established IPsec suite as a secure tunneling solution. One strategy to meet these new requirements has been the design of software-based overlay networks. In this thesis, we assess the deployment of a traditional IPsec VPN solution against a new secure overlay mesh network called Nebula. We conduct a case study b
APA, Harvard, Vancouver, ISO, and other styles
2

Kalibjian, Jeff. "AN UPDATE ON NETWORK-BASED SECURITY TECHNOLOGIES APPLICABLE TO TELEMETRY POST-PROCESSING AND ANALYSIS ACTIVITIES." International Foundation for Telemetering, 2007. http://hdl.handle.net/10150/604578.

Full text
Abstract:
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Networked based technologies (i.e. TCP/IP) have come to play an important role in the evolution of telemetry post processing services. A paramount issue when using networking to access/move telemetry data is security. In past years papers have focused on individual security technologies and how they could be used to secure telemetry data. This paper will review currently available network
APA, Harvard, Vancouver, ISO, and other styles
3

Pelevin, Dmitrii. "Research of methods and algorithms of insider detection in a computer network using machine learning technologies." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21877.

Full text
Abstract:
Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. A huge number of systems rely on the continuous transmission of data through computer networks. Nowadays it is difficult to imagine a sphere of human activity that would not be affected by information technologies and would not use computer networks. Along with the means of protecting information, the technol
APA, Harvard, Vancouver, ISO, and other styles
4

Daniels, Anton. "Information Security in an Internet of Things Network Based on Blockchains and User Participation." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74757.

Full text
Abstract:
The amount of connected Internet of Things devices has seen a large growth during the last couple of years and shows no signs of slowing down. Considering the momentum of the technological advancement in our society with new technologies such as blockchains, AI and machine learning, a large amount of issues could occur if not prevented beforehand, especially within security. Therefore this thesis will examine how to maintain the information security in an Internet of Things network based on blockchains and user participation, by taking an exploratory approach to create an understanding of the
APA, Harvard, Vancouver, ISO, and other styles
5

Sirisukha, Sid. "Protecting management information systems virtual private network competitive advantage : a thesis submitted to the graduate faculty of design and creative technologies AUT University in partial fulfilment for the degree of doctor of philosophy, 2007." Click here to access this resource online, 2007. http://aut.researchgateway.ac.nz/handle/10292/324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suárez, Trujillo Luis Carlos. "Securing network slices in 5th generation mobile networks." Thesis, Brest, 2020. http://www.theses.fr/2020BRES0050.

Full text
Abstract:
Le « network slicing » est la pierre angulaire pour la conception et le déploiement de services de communication à forte valeur ajoutée qui seront supportés par les nouveaux cas d’usage introduits par la nouvelle architecture 5G. Ce document souligne le défi que représente l’isolation des « network slices », et la gestion de sa sécurité en fonction des politiques retenues.Tout d’abord, un nouveau modèle de contrôle d’accès a été créé. Il permet de sécuriser les interactions entre les fonctions réseaux supportées par les systèmes 5G. Ensuite, la gestion des interactions entre les «network slice
APA, Harvard, Vancouver, ISO, and other styles
7

Bekara, Chakib. "Wireless sensor network security." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0020.

Full text
Abstract:
Durant ces dernières années, l’utilisation des réseaux de capteurs sans fils (RCSF), est devenu très répandue. Les capteurs sont habituellement déployés dans une région, pour suivre un phénomène d’intérêt (température, pression, mouvement, présence, radiation, etc,), puis rapporter son évolution à une station de base, qui prendra alors des décisions dépendant des données collectées. Vu que les capteurs sont très limités en termes de ressource (CPU, stockage, énergie), qu’ils sont une proie facile aux compromissions, qu’ils fonctionnent sans assistance humaine, et peuvent être déployés dans des
APA, Harvard, Vancouver, ISO, and other styles
8

Fana, Akhona. "An evaluation of security issues in cloud-based file sharing technologies." Thesis, University of Fort Hare, 2015. http://hdl.handle.net/10353/1841.

Full text
Abstract:
Cloud computing is one of the most promising technologies for backup and data storage that provides flexible access to data. Cloud computing plays a vital role in remote backup. It is so unfortunate that this computing technique has flaws that thrilled and edgy end users in implementing it effectively. These flaws include factors like lack of integrity, confidentiality and privacy to information. A secure cloud is impossible unless the computer-generated environment is appropriately secured. In any form of technology it is always advisable that security challenges must be prior identified and
APA, Harvard, Vancouver, ISO, and other styles
9

Elgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.

Full text
Abstract:
L’utilisation des réseaux de capteurs offre de nouvelles perspectives dans de nombreux domaines (médecine, militaire, etc.). Les données récoltées par ces capteurs circulent en clair sur les réseaux de capteurs et peuvent être interceptées par un espion. Selon le domaine d’utilisation, le niveau de sécurité souhaité peut être élevé, ce qui peut provoquer une hausse de la consommation d’énergie sur les nœuds. Ces deux contraintes, sécurité et énergie, sont difficilement conciliables. Il y a donc un compromis à trouver entre l’économie d’énergie qui va conditionner la durée de vie du réseau, et
APA, Harvard, Vancouver, ISO, and other styles
10

Boutigny, François. "Multidomain virtual network embedding under security-oriented requirements applied to 5G network slices." Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAS002.

Full text
Abstract:
La 5G apporte un nouveau concept, le network slicing (découpage du réseau en tranches). Cette technologie permet de généraliser le modèle économique des MVNO à des entreprises qui ont besoin d’opérer un réseau, sans que cela ne soit leur cœur de métier. Chaque tranche (slice) est un réseau virtuel de bout en bout, dédié et personnalisé, au-dessus d’une infrastructure partagée ; cette infrastructure elle-même être fournie par l’interconnexion de fournisseurs d’infrastructure: nous parlons dans ce cas d’infrastructure multi-domaine.L’objectif de cette thèse est d’étudier l’allocation de ces tran
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Network security technologies"

1

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bhaiji, Fahim Hussain Yusuf. Network security technologies and solutions. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amine, Abdelmalek, Boualem Benatallah, and Otmane Ait Mohamed. Network security technologies: Design and applications. Information Science Reference, an imprint of IGI Global, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hoffman, Daniel. Implementing NAP and NAC Security Technologies. John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Network security, administration, and management: Advancing technologies and practice. Information Science Reference, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Security, design, and architecture for broadband and wireless network technologies. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International MCETCH Conference on e-Technologies (3rd 2008 Montreal, Que.). 2008 International MCETCH Conference on e-Technologies: 23-25 January, 2008, Montreal, Quebec, Canada : proceedings. IEEE Computer Society, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Who might be lurking at your cyber front door? Is your system really secure?: Strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. U.S. G.P.O., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Network security technologies"

1

Zhang, Hongke, Wei Su, and Wei Quan. "Security Technologies of SINET." In Smart Collaborative Identifier Network. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49143-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Camenisch, Jan, and Anton Mityagin. "Mix-Network with Stronger Security." In Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11767831_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chakraborty, Mohuya, and Moutushi Singh. "Introduction to Network Security Technologies." In The "Essence" of Network Security: An End-to-End Panorama. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9317-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Lei. "Applications, Technologies, and Standards in Secure Wireless Networks and Communications." In Wireless Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ray, Niranjan K., Biswaranjan Acharya, and Anil Kumar Swain. "Network Big Data Security Issues." In Encyclopedia of Big Data Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-77525-8_240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ray, Niranjan K., Biswaranjan Acharya, and Anil Kumar Swain. "Network Big Data Security Issues." In Encyclopedia of Big Data Technologies. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-63962-8_240-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shen, Ningguo, Bin Yu, Mingxiang Huang, and Hailin Xu. "E2E Network Security on an Intent-Driven Campus Network." In Campus Network Architectures and Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003143314-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thakare, Sheetal, Anshuman Pund, and M. A. Pund. "Network Security: Approach Based on Network Traffic Prediction." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sheng, Cheng, Jie Bai, and Qi Sun. "Security: Top Priority." In Software-Defined Wide Area Network Architectures and Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003144038-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Papakonstantinou, Ioannis, and Nicolas Sklavos. "Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs." In Computer and Network Security Essentials. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network security technologies"

1

Lee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhen Wang, Zhijie Liu, and Xiaoyao Xie. "The research of network security technologies." In 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication (2009 ASID). IEEE, 2009. http://dx.doi.org/10.1109/icasid.2009.5277012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pei, Xu. "Analysis of Network Attack Technologies and Network Security." In 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/emcm-16.2017.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stotts, Larry B., and John G. Allen. "Networking: technologies and challenges for network-centric operations." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.548185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Spannenburg, Sybrand. "Machine-detectable copying security elements." In Advanced Imaging and Network Technologies, edited by Jan Bares, Christopher T. Bartlett, Paul A. Delabastita, et al. SPIE, 1997. http://dx.doi.org/10.1117/12.266327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Avedyan, Eduard, Alexander Galushkin, and Dmitry Pantiukhin. "Neural network technologies for information systems security." In 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). IEEE, 2014. http://dx.doi.org/10.1109/cisda.2014.7035632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choudhary, Abdur Rahim, and Alan Sekelsky. "Securing IPv6 network infrastructure: A new security model." In 2010 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2010. http://dx.doi.org/10.1109/ths.2010.5654971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Farquharson, J., A. Wang, and J. Howard. "Smart Grid Cyber Security and substation Network Security." In 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). IEEE, 2012. http://dx.doi.org/10.1109/isgt.2012.6175788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Faujdar, Neetu, Aparna Sinha, Harsh Sharma, and Eshaan Verma. "Network Security in Software defined Networks (SDN)." In 2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE). IEEE, 2020. http://dx.doi.org/10.1109/icstcee49637.2020.9277300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smeliansky, R. L. "SDN for network security." In 2014 International Science and Technology Conference (Modern Networking Technologies) (MoNeTeC). IEEE, 2014. http://dx.doi.org/10.1109/monetec.2014.6995602.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Network security technologies"

1

Hurd, Steven A., Jason Edwin Stamp, David P. Duggan, and Adrian R. Chavez. Applying New Network Security Technologies to SCADA Systems. Office of Scientific and Technical Information (OSTI), 2006. http://dx.doi.org/10.2172/1137212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sayers, Dave, Rui Sousa-Silva, Sviatlana Höhn, et al. The Dawn of the Human-Machine Era: A forecast of new and emerging language technologies. Open Science Centre, University of Jyväskylä, 2021. http://dx.doi.org/10.17011/jyx/reports/20210518/1.

Full text
Abstract:
New language technologies are coming, thanks to the huge and competing private investment fuelling rapid progress; we can either understand and foresee their effects, or be taken by surprise and spend our time trying to catch up. This report scketches out some transformative new technologies that are likely to fundamentally change our use of language. Some of these may feel unrealistically futuristic or far-fetched, but a central purpose of this report - and the wider LITHME network - is to illustrate that these are mostly just the logical development and maturation of technologies currently i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!