Journal articles on the topic 'Network Threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network Threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saddam RA, Angga Pranata, Sugiono, et al. "Sniffing and Spoofing in Computer Security." International Journal of Integrative Sciences 2, no. 6 (2023): 881–86. http://dx.doi.org/10.55927/ijis.v2i6.4528.
Full textNovokhrestov, Aleksey, Anton Konev, and Alexander Shelupanov. "Model of Threats to Computer Network Software." Symmetry 11, no. 12 (2019): 1506. http://dx.doi.org/10.3390/sym11121506.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.pp258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. http://dx.doi.org/10.11591/csit.v4i3.p258-267.
Full textWahyuningsih, Tri, Irwan Sembiring, Adi Setiawan, and Iwan Setyawan. "Exploring network security threats through text mining techniques: a comprehensive analysis." Computer Science and Information Technologies 4, no. 3 (2023): 258–67. https://doi.org/10.11591/csit.v4i3.pp258-267.
Full textAkoh Atadoga, Enoch Oluwademilade Sodiya, Uchenna Joseph Umoga, and Olukunle Oladipupo Amoo. "A comprehensive review of machine learning's role in enhancing network security and threat detection." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 877–86. http://dx.doi.org/10.30574/wjarr.2024.21.2.0501.
Full textAkoh, Atadoga, Oluwademilade Sodiya Enoch, Joseph Umoga Uchenna, and Oladipupo Amoo Olukunle. "A comprehensive review of machine learning's role in enhancing network security and threat detection." World Journal of Advanced Research and Reviews 21, no. 2 (2024): 877–86. https://doi.org/10.5281/zenodo.14008462.
Full textK, Pramod, and Aswathy Venu. "Self-Defending Networks." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 2330–37. http://dx.doi.org/10.22214/ijraset.2023.49894.
Full textKwubeghari, Anthony, Lucy Ifeyinwa Ezigbo, and Francis Amaechi Okoye. "Modelling of Cyber Attack Detection and Response System for 5G Network Using Machine Learning Technique." ABUAD Journal of Engineering Research and Development (AJERD) 7, no. 2 (2024): 297–307. http://dx.doi.org/10.53982/ajerd.2024.0702.29-j.
Full textYang, Hongyu, Renyun Zeng, Fengyan Wang, Guangquan Xu, and Jiyong Zhang. "An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things." Security and Communication Networks 2020 (November 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/6656066.
Full textLv, Huiying, Yuan Zhang, and Jie Wang. "Network Threat Identification and Analysis Based on a State Transition Graph." Cybernetics and Information Technologies 13, Special-Issue (2013): 51–61. http://dx.doi.org/10.2478/cait-2013-0037.
Full textSandy, Djoko Andoko, Poppy Setiawati Nurisnaeny, and Mira Murniasari. "The Threat of Social Network Games in Indonesia." Borneo Educational Journal (Borju) 5, no. 2 (2023): 335–51. http://dx.doi.org/10.24903/bej.v5i2.1393.
Full textBelosay, Ruchita P. "Security Risks in 5G." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50837.
Full textFarooqui, Muhammad Najmul Islam, Junaid Arshad, and Muhammad Mubashir Khan. "A Layered Approach to Threat Modeling for 5G-Based Systems." Electronics 11, no. 12 (2022): 1819. http://dx.doi.org/10.3390/electronics11121819.
Full textChadrack, Irabaruta, and Dr Nyesheja Muhire Enan. "AI Powered Network Traffic Detection." Journal of Information and Technology 5, no. 2 (2025): 53–65. https://doi.org/10.70619/vol5iss2pp53-65.
Full textGolchha, Prakhar, Rajesh Deshmukh, and Palak Lunia. "A Review on Network Security Threats and Solutions." International Journal of Scientific Engineering and Research 3, no. 4 (2015): 21–24. https://doi.org/10.70729/ijser1567.
Full textSimonjan, Jennifer, Sebastian Taurer, and Bernhard Dieber. "A Generalized Threat Model for Visual Sensor Networks." Sensors 20, no. 13 (2020): 3629. http://dx.doi.org/10.3390/s20133629.
Full textDandamudi, Sai Ratna Prasad, Jaideep Sajja, and Amit Khanna. "AI Transforming Data Networking and Cybersecurity through Advanced Innovations." International Journal of Innovative Research in Computer Science and Technology 13, no. 1 (2025): 42–49. https://doi.org/10.55524/ijircst.2025.13.1.6.
Full textBhelkar,, Mr Sahil. "Network Intrusion Detection System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31278.
Full textHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (2020): 5297. http://dx.doi.org/10.3390/s20185297.
Full textMichael, Tressa. "CNN Intrusion Detection for Threat Analysis of a Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3945–49. http://dx.doi.org/10.17762/turcomat.v12i3.1683.
Full textNayana R, Harish G N, and Asharani R. "A comprehensive survey of modern network security techniques and challenges." World Journal of Advanced Research and Reviews 3, no. 2 (2019): 101–10. http://dx.doi.org/10.30574/wjarr.2019.3.2.0069.
Full textIvanovich Vatin, Nikolai, and Rama Sundari. "Securing electric transportation networks: A machine learning-driven cyber threat detection." MATEC Web of Conferences 392 (2024): 01184. http://dx.doi.org/10.1051/matecconf/202439201184.
Full textAmirthayogam, G., N. Kumaran, S. Gopalakrishnan, K. R. Aravind Brito, S. RaviChand, and Shruti Bhargava Choubey. "Integrating Behavioral Analytics and Intrusion Detection Systems to Protect Critical Infrastructure and Smart Cities." Babylonian Journal of Networking 2024 (July 1, 2024): 88–97. http://dx.doi.org/10.58496/bjn/2024/010.
Full textHariyadi, Dedy, Kartikadyota Kusumaningtyas, and Burhan Alfironi Muktamar. "Implementasi Malicious Traffic Untuk Mendeteksi Serangan Siber di SMK Muhammadiyah 1 Yogyakarta." INTEK : Jurnal Informatika dan Teknologi Informasi 6, no. 2 (2023): 73–78. http://dx.doi.org/10.37729/intek.v6i2.3776.
Full textHARSHINI A, Ms. "WIRELESS NETWORK SECURITY ENHANCEMENT WITH ZITA." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–7. https://doi.org/10.55041/isjem03186.
Full textTerentyev, Alexander, Olena Dolya, Tamara Lyashchenko, and Oleh Kuzminskyi. "DIAGNOSING AND COUNTERACTING NETWORK THREATS." Management of Development of Complex Systems, no. 42 (June 4, 2020): 125–31. http://dx.doi.org/10.32347/2412-9933.2020.42.125-131.
Full textNewson, Alan. "Network threats and vulnerability scanners." Network Security 2005, no. 12 (2005): 13–15. http://dx.doi.org/10.1016/s1353-4858(05)70314-7.
Full textParida Amalia and Muhammad Irwan Padli Nasution. "TANTANGAN TERKINI DALAM KEAMANAN INFORMASI ANALISIS RESIKO DAN UPAYA PERLINDUNGAN." JURNAL EKONOMI BISNIS DAN MANAJEMEN 2, no. 1 (2023): 24–37. http://dx.doi.org/10.59024/jise.v2i1.529.
Full textSheela Hundekari. "Cybersecurity Threats in Digital Payment Systems (DPS): A Data Science Perspective." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 491–503. https://doi.org/10.52783/jisem.v10i13s.2104.
Full textReddy, Mr K. V. Siva Prasad, B. Mohith, P. Mahesh Babu, and K. Navtej. "CyberSleuth AI: Intelligent Network Forensics Analyzer." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 1643–47. https://doi.org/10.22214/ijraset.2025.68420.
Full textPopaja, Nejla, Sabina Baraković, and Jasmina Baraković Husić. "Analysis of Threats for Ambient Assisted Living (AAL) Wireless Sensor Network (WSN)-Based System." B&H Electrical Engineering 15, no. 2 (2021): 31–39. http://dx.doi.org/10.2478/bhee-2021-0015.
Full textDr. R. Balasubramanian, P. Ramachandran ,. "TC-CNN: A Tree Classified model using AI for identifying malware intrusions in open Networks." Psychology and Education Journal 58, no. 2 (2021): 6561–73. http://dx.doi.org/10.17762/pae.v58i2.3189.
Full textAddula, Santosh Reddy, Udit Mamodiya, Weiwei Jiang, and Mohammed Amin Almaiah. "Generative AI-Enhanced Intrusion Detection Framework for Secure Healthcare Networks in MANETs." SHIFRA 2025 (February 1, 2025): 62–68. https://doi.org/10.70470/shifra/2025/003.
Full textNIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Full textChavan, Mr Vikram. "Malware Classification using Machine Learning Algorithms and Tools." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 69–73. http://dx.doi.org/10.22214/ijraset.2021.34353.
Full textMaystrenko, V. A., and O. A. Bezrodnykh. "ASSESSMENT OF NETWORK THREATS TO INFORMATION SECURITY FOR SOFTWARE AND HARDWARE OF MEDICAL INFORMATION SYSTEMS." DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES 10, no. 3 (2022): 79–86. http://dx.doi.org/10.25206/2310-9793-2022-10-3-79-86.
Full textLysov, Bogdan, Vira Huskova, Tetiana Prosiankina-Zharova, and Artem Khalygov. "Information technology for the classification of data monitoring systems and data transmission networks for cyber threat detection." Bulletin of the National Technical University "KhPI" A series of "Information and Modeling" 1, no. 1 (13) (2025): 129–47. https://doi.org/10.20998/2411-0558.2025.01.09.
Full textShaik, Sabeeruddin. "Emerging Network Security Threats: Preparing for the Next Decade." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–7. https://doi.org/10.55041/ijsrem30039.
Full textShaik, Sabeeruddin. "Emerging Network Security Threats: Preparing for the Next Decade." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem44270.
Full textKearney, Stephen G., Vanessa M. Adams, Richard A. Fuller, Hugh P. Possingham, and James E. M. Watson. "Estimating the benefit of well-managed protected areas for threatened species conservation." Oryx 54, no. 2 (2018): 276–84. http://dx.doi.org/10.1017/s0030605317001739.
Full textYe, Shengke, Kaiye Dai, Guoli Fan, Ling Zhang, and Zhihao Liang. "Exploring the intersection of network security and database communication: a PostgreSQL Socket Connection case study." Transactions on Computer Science and Intelligent Systems Research 3 (April 10, 2024): 1–9. http://dx.doi.org/10.62051/pzqebt34.
Full textSubha K, Benitlin. "AI-Driven Cybersecurity Model for Real-Time Threat Detection and Prevention." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47712.
Full textHe, Fangzhou, Wei Bai, and Zhiqi Wang. "Optimization of the Decision-making Process of Digital Twins in Network Security Based on Graph Neural Networks." Network Security 2024, no. 10 (2025): 73–83. https://doi.org/10.70985/rpa1ez48.
Full textEnyinaya Stefano Okafor, Olatunji Akinrinola, Favour Oluwadamilare Usman, Olukunle Oladipupo Amoo, and Nneka Adaobi Ochuba. "CYBERSECURITY ANALYTICS IN PROTECTING SATELLITE TELECOMMUNICATIONS NETWORKS: A CONCEPTUAL DEVELOPMENT OF CURRENT TRENDS, CHALLENGES, AND STRATEGIC RESPONSES." International Journal of Applied Research in Social Sciences 6, no. 3 (2024): 254–66. http://dx.doi.org/10.51594/ijarss.v6i3.854.
Full textAlin, G., A. Konsbayev, and N. Abdikaparov. "HARNESSING ARTIFICIAL INTELLIGENCE FOR ADVANCED THREAT DETECTION IN NETWORK INFRASTRUCTURES." INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES 5, no. 2(18) (2024): 70–83. http://dx.doi.org/10.54309/ijict.2024.18.2.007.
Full textR. Vinoth Kumar. "Enhancing Threat Prioritization In Cybersecurity Using Avian Shield Optimizer (ASO) In Graph Forge Elite (GFE) Framework." Journal of Electrical Systems 20, no. 4s (2024): 2257–71. http://dx.doi.org/10.52783/jes.2396.
Full textSun, Xiu Juan. "Personal Computer Network Security Prevention Research." Advanced Materials Research 971-973 (June 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.
Full textSitorus, Felix Noel, and Ruki Harwahyu. "Analysis of Employee Capacity Gap in Managing Network Security and Its Implementation Towards Insider Threat Prevention." MALCOM: Indonesian Journal of Machine Learning and Computer Science 5, no. 2 (2025): 635–44. https://doi.org/10.57152/malcom.v5i2.1878.
Full textAhmad, Iftikhar, Qazi Emad Ul Haq, Muhammad Imran, Madini O. Alassafi, and Rayed A. AlGhamdi. "An Efficient Network Intrusion Detection and Classification System." Mathematics 10, no. 3 (2022): 530. http://dx.doi.org/10.3390/math10030530.
Full text