Academic literature on the topic 'Signal processing for network security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Signal processing for network security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Signal processing for network security"
Alapati, Yaswanth Kumar, and Suban Ravichandran. "An Efficient Signal Processing Model for Malicious Signal Identification and Energy Consumption Reduction for Improving Data Transmission Rate." Traitement du Signal 38, no. 3 (2021): 837–43. http://dx.doi.org/10.18280/ts.380330.
Full textGao, Feng, Yun Wu, and Shang Qiong Lu. "LabVIEW-Based Virtual Laboratory for Digital Signal Processing." Advanced Materials Research 268-270 (July 2011): 2150–57. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.2150.
Full textXue, Lian, and Cheng-song Hu. "A Vibration Signal Processing of Large-scale Structural Systems Based on Wireless Sensor." International Journal of Online Engineering (iJOE) 13, no. 05 (2017): 43. http://dx.doi.org/10.3991/ijoe.v13i05.7050.
Full textCheng, Jie, Bingjie Lin, Jiahui Wei, and Ang Xia. "The Compound Prediction Analysis of Information Network Security Situation based on Support Vector Combined with BP Neural Network Learning Algorithm." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 489–96. http://dx.doi.org/10.46300/9106.2022.16.60.
Full textXiang, Zhongwu, Weiwei Yang, Gaofeng Pan, Yueming Cai, and Yi Song. "Physical Layer Security in Cognitive Radio Inspired NOMA Network." IEEE Journal of Selected Topics in Signal Processing 13, no. 3 (2019): 700–714. http://dx.doi.org/10.1109/jstsp.2019.2902103.
Full textDemidov, R. A., P. D. Zegzhda, and M. O. Kalinin. "Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model." Automatic Control and Computer Sciences 52, no. 8 (2018): 971–76. http://dx.doi.org/10.3103/s0146411618080084.
Full textJi, Cheongmin, Taehyoung Ko, and Manpyo Hong. "CA-CRE: Classification Algorithm-Based Controller Area Network Payload Format Reverse-Engineering Method." Electronics 10, no. 19 (2021): 2442. http://dx.doi.org/10.3390/electronics10192442.
Full textTu, Jun, Willies Ogola, Dehong Xu, and Wei Xie. "Intrusion Detection Based on Generative Adversarial Network of Reinforcement Learning Strategy for Wireless Sensor Networks." International Journal of Circuits, Systems and Signal Processing 16 (January 13, 2022): 478–82. http://dx.doi.org/10.46300/9106.2022.16.58.
Full textPeng, Qi Hua. "An Improved Abnormal Behavior Feature Detection Algorithm of Network Information Based on Fractional Fourier Transform." Applied Mechanics and Materials 513-517 (February 2014): 2408–11. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2408.
Full textAhmed, Aseel K., and Abbas Akram Khorsheed. "Open network structure and smart network to sharing cybersecurity within the 5G network." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (2022): 573. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp573-582.
Full textDissertations / Theses on the topic "Signal processing for network security"
Lu, Xiaotao. "Cost-effective signal processing algorithms for physical-layer security in wireless networks." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16043/.
Full textDi, Mauro Mario. "Statistical models for the characterization, identification and mitigation of distributed attacks in data networks." Doctoral thesis, Universita degli studi di Salerno, 2018. http://hdl.handle.net/10556/3088.
Full textMynampati, Vittal Reddy, Dilip Kandula, Raghuram Garimilla, and Kalyan Srinivas. "Performance and Security of Wireless Mesh Networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2901.
Full textXu, Jingxin. "Unusual event detection in crowded scenes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/76365/1/Jingxin_Xu_Thesis.pdf.
Full textMoore, Patrick. "Architectural investigation into network security processing." Thesis, Queen's University Belfast, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492519.
Full textZhao, Wentao. "Genomic applications of statistical signal processing." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2952.
Full textLiu, Jinshan. "Secure and reliable deep learning in signal processing." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103740.
Full textFarhat, Md Tanzin. "An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.
Full textCARDOSO, LUIZ ALBERTO LISBOA DA SILVA. "ANALYSIS OF PLASTIC NEURAL NETWORK MODELLING APPROACH TO SIGNAL PROCESSING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1992. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9512@1.
Full textHarper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.
Full textBooks on the topic "Signal processing for network security"
International, Conference on Intelligent Information Hiding and Multimedia Signal Processing (4th 2008 Harbin Shi China). IIH-MSP 2008 : 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing : 15-17 August 2008, Harbin, China. IEEE Computer Society, 2008.
Find full textInternational Conference on Intelligent Information Hiding and Multimedia Signal Processing (2nd 2006 Pasadena, Calif.). 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing: (IIH-MSP 2006) : proceedings ; 18-20 December, 2006, Pasadena, California, USA. IEEE Computer Society, 2006.
Find full textJoaquim, Filipe, Coelhas Helder, Saramago Monica, and International Conference on E-business and Telecommunication Networks (2nd : 2005 : Reading, England), eds. E-business and telecommunication networks: Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005 : selected papers. Springer, 2007.
Find full textPathak, Manas A. Privacy-Preserving Machine Learning for Speech Processing. Springer New York, 2013.
Find full text1944-, Deprettere Ed F., Leupers Rainer, Takala Jarmo, and SpringerLink (Online service), eds. Handbook of Signal Processing Systems. Springer Science+Business Media, LLC, 2010.
Find full textDey, Nilanjan, and V. Santhi, eds. Intelligent Techniques in Signal Processing for Multimedia Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44790-2.
Full textSecurity+ guide to network security fundamentals. 3rd ed. Course Technology, Cengage Learning, 2009.
Find full textTakanami, Tetsuo, and Genshiro Kitagawa. Methods and Applications of Signal Processing in Seismic Network Operations. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/bfb0117693.
Full textmissing], [name. Methods and applications of signal processing in seismic network operations. Springer, 2003.
Find full textBook chapters on the topic "Signal processing for network security"
Wang, Wenting, Xin Liu, Xiaohong Zhao, Yang Zhao, Rui Wang, and Jianpo Li. "Design of Intelligent Substation Communication Network Security Audit System." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_48.
Full textWang, Wenting, Guilin Huang, Xin Liu, Hao Zhang, Rui Wang, and Jianpo Li. "Research on Security Auditing Scheme of Intelligent Substation Communication Network." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_49.
Full textSawlikar, Alka P., Z. J. Khan, and S. G. Akojwar. "Parametric Evaluation of Different Cryptographic Techniques for Enhancement of Energy Efficiency in Wireless Communication Network." In Intelligent Techniques in Signal Processing for Multimedia Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44790-2_9.
Full textGao, Lifang, Zhihui Wang, Huifeng Yang, et al. "Network Security Situation Assessment of Power Information System Based on Improved Artificial Bee Colony Algorithm." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6420-2_42.
Full textYang, Yong, Jilin Wang, Rong Li, and Jinxiong Zhao. "Review of Constructing the Early Warning and Diagnosis Information Database of Power Plant Network Security Events." In 3D Imaging Technologies—Multidimensional Signal Processing and Deep Learning. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3180-1_37.
Full textWu, Ji, Qilian Liang, Baoju Zhang, and Xiaorong Wu. "Security Analysis of Distributed Compressive Sensing-Based Wireless Sensor Networks." In The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-00536-2_5.
Full textBenesty, Jacob, Tomas Gänsler, Dennis R. Morgan, M. Mohan Sondhi, and Steven L. Gay. "Dynamic Resource Allocation for Network Echo Cancellation." In Digital Signal Processing. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-662-04437-7_4.
Full textMarks, Friedrich, Ursula Klingmüller, and Karin Müller-Decker. "Supplying the Network with Energy: Basic Biochemistry of Signal Transduction." In Cellular Signal Processing. Garland Science, 2017. http://dx.doi.org/10.4324/9781315165479-2.
Full textKhattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RBS Security Analysis." In Analog Circuits and Signal Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47545-5_5.
Full textCampion, Sébastien, Julien Devigne, Céline Duguey, and Pierre-Alain Fouque. "Multi-Device for Signal." In Applied Cryptography and Network Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57878-7_9.
Full textConference papers on the topic "Signal processing for network security"
Fok, Mable P., Konstantin Kravtsov, Yanhua Deng, Zhenxing Wang, and Paul R. Prucnal. "Providing Network Security with Optical Signal Processing." In 2008 IEEE PhotonicsGlobal@Singapore (IPGC). IEEE, 2008. http://dx.doi.org/10.1109/ipgc.2008.4781422.
Full textCao, Zhanghua, Yuansheng Tang, and Xinmei Huang. "Against wiretappers without key-security is an intrinsic property of network coding." In Signal Processing (ICICS). IEEE, 2009. http://dx.doi.org/10.1109/icics.2009.5397469.
Full textJia, Fenggen, Weiming Wang, Ming Gao, and Chaoqi Lv. "A real-time rule-matching algorithm for the network security audit system." In Signal Processing (ICICS). IEEE, 2009. http://dx.doi.org/10.1109/icics.2009.5397574.
Full textKhan, Jihas. "Vehicle network security testing." In 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS). IEEE, 2017. http://dx.doi.org/10.1109/ssps.2017.8071577.
Full textKo, Hoon, Chang Choi, Pankoo Kim, and Junho Choi. "NETWORK SECURITY ARCHITECTURE AND APPLICATIONS BASED ON CONTEXT-AWARE SECURITY." In 7th International Conference on Signal Image Processing and Multimedia. AIRCC Publication, 2019. http://dx.doi.org/10.5121/csit.2019.90308.
Full textGemilang Gultom, Rudy Agus, Tatan Kustana, and Romie Oktovianus Bura. "ENHANCING COMPUTER NETWORK SECURITY ENVIRONMENT BY IMPLEMENTING THE SIX-WARE NETWORK SECURITY FRAMEWORK (SWNSF)." In 7th International Conference on Signal, Image Processing and Pattern Recognition. AIRCC Publication Corporation, 2018. http://dx.doi.org/10.5121/csit.2018.81714.
Full textDu, Haoyuan, Meng Fan, and Liquan Dong. "Super-resolution network for x-ray security inspection." In OIT21: Optoelectronic Imaging/Spectroscopy and Signal Processing Technology, edited by Xun Cao, Chao Zuo, Wolfgang Osten, Guohai Situ, and Xiaopeng Shao. SPIE, 2022. http://dx.doi.org/10.1117/12.2616535.
Full textDo, Emily H., and Vijay N. Gadepally. "Classifying Anomalies for Network Security." In ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2020. http://dx.doi.org/10.1109/icassp40776.2020.9053419.
Full textPrasad, Jai Prakash, and S. C. Mohan. "Energy Efficient Dual Function Security Protocol for Wireless Sensor Network." In Second International Conference on Signal Processing, Image Processing and VLSI. Research Publishing Services, 2015. http://dx.doi.org/10.3850/978-981-09-6200-5_d-28.
Full textOujezsky, Vaclav, David Chapcak, Tomas Horvath, and Petr Munster. "Security Testing Of Active Optical Network Devices." In 2019 42nd International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2019. http://dx.doi.org/10.1109/tsp.2019.8768811.
Full textReports on the topic "Signal processing for network security"
Tong, Lang. Network-Centric Distributed Signal Processing. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada519513.
Full textFriedman, Haya, Julia Vrebalov, and James Giovannoni. Elucidating the ripening signaling pathway in banana for improved fruit quality, shelf-life and food security. United States Department of Agriculture, 2014. http://dx.doi.org/10.32747/2014.7594401.bard.
Full textTayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, 2022. http://dx.doi.org/10.31979/mti.2022.2014.
Full textIrudayaraj, Joseph, Ze'ev Schmilovitch, Amos Mizrach, Giora Kritzman, and Chitrita DebRoy. Rapid detection of food borne pathogens and non-pathogens in fresh produce using FT-IRS and raman spectroscopy. United States Department of Agriculture, 2004. http://dx.doi.org/10.32747/2004.7587221.bard.
Full textFederal Information Processing Standards Publication: guideline for the analysis of local area network security. National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.191.
Full text