Academic literature on the topic 'Network Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network Threats"
Saddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textNovokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (2019): 1506. http://dx.doi.org/10.3390/sym11121506.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.
Full textAkoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, and Olukunle Oladipupo Amoo. "A comprehensive review of machine learning's role in enhancing network security and threat detection." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 877–86. http://dx.doi.org/10.30574/wjarr.2024.21.2.0501.
Full textAkoh, Atadoga, Oluwademilade Sodiya Enoch, Joseph Umoga Uchenna, and Oladipupo Amoo Olukunle. "A comprehensive review of machine learning's role in enhancing network security and threat detection." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 877–86. https://doi.org/10.5281/zenodo.14008462.
Full textK, Pramod, and Aswathy Venu. "Self-Defending Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2330–37. http://dx.doi.org/10.22214/ijraset.2023.49894.
Full textKwubeghari, Anthony, Lucy Ifeyinwa Ezigbo, and Francis Amaechi Okoye. "Modelling of Cyber Attack Detection and Response System for 5G Network Using Machine Learning Technique." ABUAD Journal of Engineering Research and Development (AJERD) 7, no. 2 (2024): 297–307. http://dx.doi.org/10.53982/ajerd.2024.0702.29-j.
Full textYang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.
Full textDissertations / Theses on the topic "Network Threats"
Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.
Full textBerthier, Robin G. "Advanced honeypot architecture for network threats quantification." College Park, Md. : University of Maryland, 2009. http://hdl.handle.net/1903/9204.
Full textStojanov, Martin. "eHealth and IT in Network Healthcare : Threats and Opportunities." Thesis, Uppsala universitet, Avdelningen för visuell information och interaktion, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-262195.
Full textDenison, Stephen. "The accessibility of insider threats on a corporate network." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604807.
Full textLysenko, Julia Vladimirovna, and Юлія Володимирівна Лисенко. "5G-technology: social advantaged and threats." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51667.
Full textLindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.
Full textEkwall, Daniel. "Managing the risk for antagonistic threats against the transport network." Doctoral thesis, Göteborg : Borås : Division of Logistics and Transportation, Chalmers University of Technology ; School of Engineering, University of Borås, 2009. http://hdl.handle.net/2320/5033.
Full textAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Full textShen, Dakun. "Malicious Manipulation in Service-Oriented Network, Software, and Mobile Systems: Threats and Defenses." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7938.
Full textClementson, Christian. "Client-side threats and a honeyclient-based defense mechanism, Honeyscout." Thesis, Department of Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-20104.
Full textBooks on the topic "Network Threats"
Cameron, Debra. Global network security: Threats and countermeasures. Computer Technology Research Corp., 2000.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textPhilippe, B. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full textResearch Institute for Advanced Computer Science (U.S.), ed. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full text1967-, Wright Rebecca N., and Neumann Peter 1932-, eds. Network threats: DIMCS workshop, December 2-4, 1996. American Mathematical Society, 1998.
Find full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textHubbard, Douglas W. Pulse: The new science of harnessing Internet buzz to track threats and opportunities. Wiley, 2011.
Find full textSturmer, Richard Von. A network of dissolving threads. Auckland University Press, 1991.
Find full textAri, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2008.
Find full textBook chapters on the topic "Network Threats"
Grammatikis, Panagiotis Radoglou, and Panagiotis Sarigiannidis. "Network Threats." In Cyber-Security Threats, Actors, and Dynamic Mitigation. CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-5.
Full textMeadows, Catherine. "A representation of protocol attacks for risk assessment." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/01.
Full textZhou, Dan, and Shiu-Kai Chin. "Verifying privacy enhanced mail functions with higher order logic." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/02.
Full textJoye, Marc, and Jean-Jacques Quisquater. "Cryptanalysis of RSA-type cryptosystems: A visit." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/03.
Full textPatel, Sarvar. "Information leakage in encrypted key exchange." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/04.
Full textShostack, Adam. "Observed weaknesses in security dynamics’ client/server protocol." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/05.
Full textDean, Drew. "Web security: A high level view." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/06.
Full textWallach, Dan, Jim Roskind, and Edward Felten. "Flexible, extensible Java security using digital signature." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/07.
Full textBurmester, Mike, Yvo Desmedt, and Grigori Kabatianski. "Trust and security: A new look at the Byzantine generals problem." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/08.
Full textHall, Robert. "Channels: Avoiding unwanted electronic mail." In Network Threats. American Mathematical Society, 1997. http://dx.doi.org/10.1090/dimacs/038/09.
Full textConference papers on the topic "Network Threats"
Dhabliya, Dharmesh, N. Thangarasu, Shivam Khurana, X. Mercilin Raajini, Shobhit Goyal, and D. T. Arunkumar. "Vehicular Network Security: Threats, Vulnerabilities and Countermeasures." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724268.
Full textQin, Qiu, Xu Sijia, Liu Shenglan, Xu Tianni, and Zhao Bei. "Network Virtualization Security: Threats, Measures, and Use Cases." In 2024 ITU Kaleidoscope: Innovation and Digital Transformation for a Sustainable World (ITU K). IEEE, 2024. https://doi.org/10.23919/ituk62727.2024.10772977.
Full textGuo, Zhida, Xiaoli Li, Haobin Shen, Xiaolu Zhang, Wanji Wang, and Dehua Xie. "Detecting advanced persistent threats via casual graph neural network." In International Conference on Network Communication and Information Security (ICNCIS 2024), edited by Pascal Lorenz and Ljiljana Trajkovic. SPIE, 2025. https://doi.org/10.1117/12.3052125.
Full textUzair, Muhammad, Husnain Mushtaq, Zafran Waheed, Irshad Ullah, and Adeel Ahmed Abbasi. "Comprehensive Analysis of Computer Network Threats and Security Measures." In 2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024. https://doi.org/10.1109/hpcc64274.2024.00249.
Full textThummala, Venkata Reddy, Phanindra Kumar Kankanampati, Pratik Agarwal, Swethasri Kavuri, Ravi Mandliya, and Arpit Goel. "Network Security Threats and Mitigation Strategies in Mobile Networks: A Machine Learning Perspective." In 2025 International Conference on Pervasive Computational Technologies (ICPCT). IEEE, 2025. https://doi.org/10.1109/icpct64145.2025.10940458.
Full textFrancis, Georges, Majed Sanan, Makram Hatoum, Nader Bakir, and Khouloud Samrouth. "Detecting Advanced Persistent Threats on a Network Using Machine Learning." In 2024 International Conference on Smart Systems and Power Management (IC2SPM). IEEE, 2024. https://doi.org/10.1109/ic2spm62723.2024.10841340.
Full textXia, Tao, Menglin Wang, Jun He, Hai Guo, Zhiqiang Qu, and Jianguo Yuan. "Research on Drone Network Security Issues under Quantum Attack Threats." In 2024 4th International Conference on Communication Technology and Information Technology (ICCTIT). IEEE, 2024. https://doi.org/10.1109/icctit64404.2024.10928461.
Full textHarsha Vardhan, S., Mahesh Kumar Jha, Raveesh Hegde, Monika Singh, P. Rubini, and Amar Choudhary. "Security and Threats in Aviation: Cryptographic Based Network Security System." In 2024 International Conference on Signal Processing and Advance Research in Computing (SPARC). IEEE, 2024. https://doi.org/10.1109/sparc61891.2024.10828771.
Full textGuan, Shan, Francois Ayello, Narasi Sridhar, Jianping Liu, and Qingshan Feng. "Development of a Probabilistic Model for Assessing Pipeline Third Party Damage Threats." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12719.
Full textKulkarni, G., P. Khatawkar, K. Gaikwad, V. Solanke, R. Shelk, and S. Gujar. "Wireless sensor network security threats." In Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2225.
Full textReports on the topic "Network Threats"
Heckathorn, Matthew. Network Monitoring for Web-Based Threats. Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada537060.
Full textVogt, C., and J. Kempf. Security Threats to Network-Based Localized Mobility Management (NETLMM). RFC Editor, 2007. http://dx.doi.org/10.17487/rfc4832.
Full textHranov, Nikolay Naydenov. Evaluation techniques for cyber threats in network management systems. Procon, 2023. http://dx.doi.org/10.11610/it4sec.0151.
Full textLippmann, R. P., J. F. Riordan, T. H. Yu, and K. K. Watson. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada565825.
Full textSentz, Kari, and Jacob Green. Threat Network: Network of Networks Graphic. Office of Scientific and Technical Information (OSTI), 2014. http://dx.doi.org/10.2172/1162150.
Full textWilson, A. M., and M. C. Kelman. Assessing the relative threats from Canadian volcanoes. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328950.
Full textWilson, A. M., and M. C. Kelman. Assessing the relative threats from Canadian volcanoes. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328950.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full textGuthrie, Richard. PR-676-233801-R08 Geohazard Program Considerations. Pipeline Research Council International, Inc. (PRCI), 2024. http://dx.doi.org/10.55274/r0000076.
Full text