Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Secure Networks.

Статті в журналах з теми "Secure Networks"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secure Networks".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Zhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Breeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Kotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Maivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.

Повний текст джерела
Анотація:
In-network aggregation is a natural approach in wireless sensor networks (WSNs) to collaboratively process data generated by the sensor nodes. Besides processing, in-network aggregation also achieves effective energy consumption and bandwidth utilization. Since the sensing devices of a WSN are prone to a variety of attacks due to wireless communication and limited resources, secure in-network aggregation is a great challenge. This article proposes a secure in-network aggregation (SINA) protocol for additive aggregation functions. This protocol integrates privacy homomorphism (PH) and secret sh
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Shang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Tamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.

Повний текст джерела
Анотація:
Human knowledge-sharing networks generate Intellectual Property and Trade Secrets that provide private enterprise with competitive advantages. Although considerable research has focused on increasing the knowledge-sharing outcomes of such networks, there has been comparatively less emphasis on examining the possibility of competitive erosion through knowledge leakage. This paper considers how to mitigate knowledge leakage by influencing the development of human knowledge sharing networks. The authors review the literatures of human knowledge sharing networks as well as information security man
Стилі APA, Harvard, Vancouver, ISO та ін.
8

von Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Al-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.

Повний текст джерела
Анотація:
The utilization of wireless sensor networks to gather, process, and act upon data may be a powerful tool in the development of a city-wide communication network that can accommodate many applications, ultimately leading to smart city solutions. Several challenges might be encountered by a smart city network. These include the need to adapt the network's coverage area to suit various applications, uneven distribution of nodes, a rise in message volume, the use of several communication technologies, and heterogeneity in both nodes and messages. There are many different facets of smart cities tha
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Sadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.

Повний текст джерела
Анотація:
Reliable Minimal Energy Cost Routing (RMECR) and Reliable Minimum Energy Routing are two ingenious dynamism- conscious routing algorithms for wireless ad hoc networks (RMER). Ad hoc network conditions for dynamism effectiveness, responsibility, and dragging network continuance are all managed by RMECR. To develop dynamism-effective and reliable pathways that outstretch the network's functional continuance, it takes into account the bumps' dynamism operation, their remaining battery dynamism, and the tractability of their links. RMER, on the other phase, is a dynamism-effective routing algorith
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Capkun, S., and J. P. Hubaux. "Secure positioning in wireless networks." IEEE Journal on Selected Areas in Communications 24, no. 2 (2006): 221–32. http://dx.doi.org/10.1109/jsac.2005.861380.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Tseung, L. C. N. "Guaranteed, reliable, secure broadcast networks." IEEE Network 3, no. 6 (1989): 33–37. http://dx.doi.org/10.1109/65.39134.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Sun, Hung-Min, and Shiuh-Pyng Shieh. "Secure broadcasting in large networks." Computer Communications 21, no. 3 (1998): 279–83. http://dx.doi.org/10.1016/s0140-3664(97)00187-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Stevenson, Daniel, Nathan Hillery, and Greg Byrd. "Secure communications in ATM networks." Communications of the ACM 38, no. 2 (1995): 45–52. http://dx.doi.org/10.1145/204826.204844.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Mitchell, Chris J., and Fred C. Piper. "Key storage in secure networks." Discrete Applied Mathematics 21, no. 3 (1988): 215–28. http://dx.doi.org/10.1016/0166-218x(88)90068-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Chithra, M. R., and Manju K. Menon. "Secure domination of honeycomb networks." Journal of Combinatorial Optimization 40, no. 1 (2020): 98–109. http://dx.doi.org/10.1007/s10878-020-00570-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Sabnis, Suhasini, Marc Verbruggen, John Hickey, and Alan J. McBride. "Intrinsically Secure Next-Generation Networks." Bell Labs Technical Journal 17, no. 3 (2012): 17–36. http://dx.doi.org/10.1002/bltj.21556.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

El Rouayheb, Salim, Emina Soljanin, and Alex Sprintson. "Secure Network Coding for Wiretap Networks of Type II." IEEE Transactions on Information Theory 58, no. 3 (2012): 1361–71. http://dx.doi.org/10.1109/tit.2011.2173631.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Mishra, Shailendra. "SDN-Based Secure Architecture for IoT." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 1–16. http://dx.doi.org/10.4018/ijkss.2020100101.

Повний текст джерела
Анотація:
Internet of things (IoT) means connecting things through the internet. The growing market for IoT also attracts malicious individuals trying to gain access to the marketplace. Security issues are among the most significant worries in companies that rely on the cloud of things to do business. SDN-based architecture has improved the security of IoT networks. The centralized controller is responsible for managing the critical network's operations, and growing the network size increases the network load in the controller. Controllers in SDN-based architecture are still facing security challenges s
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Kulkumatagi, Savita S. "Secure Data Retrieval for Decentralized Disruption-Tolerent Military Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (2016): 223–29. http://dx.doi.org/10.9756/bijsesc.8283.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Повний текст джерела
Анотація:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Goldberg, Sharon, Michael Schapira, Pete Hummon, and Jennifer Rexford. "How secure are secure interdomain routing protocols?" Computer Networks 70 (September 2014): 260–87. http://dx.doi.org/10.1016/j.comnet.2014.05.007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Jayabalan, E., and R. Pugazendi. "Generative Adversarial Networks for Secure Data Transmission in Wireless Network." Intelligent Automation & Soft Computing 35, no. 3 (2023): 3757–84. http://dx.doi.org/10.32604/iasc.2023.031200.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Wehbi, Rania, Ayman Kayssi, Ali Chehab, and Zaher Dawy. "Network Setup for Secure Routing in Inter-Vehicle Communication Networks." International Journal of Business Data Communications and Networking 2, no. 4 (2006): 1–17. http://dx.doi.org/10.4018/jbdcn.2006100101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

He, Hongliang, Shanxiang Lyu, Qinghao He, and Dongyang Xu. "Network Coding Assisted Secure Transmission in Full-Duplex Relay Networks." IEEE Transactions on Vehicular Technology 69, no. 8 (2020): 9196–200. http://dx.doi.org/10.1109/tvt.2020.3001871.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Nuñez Alvarez, José R., Yelena Pérez Zamora, Israel Benítez Pina, and Eliana Noriega Angarita. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611. http://dx.doi.org/10.11591/ijece.v11i1.pp611-619.

Повний текст джерела
Анотація:
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as the mo
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Joy, Joshua, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou, and Mario Gerla. "DiscoverFriends: secure social network communication in mobile ad hoc networks." Wireless Communications and Mobile Computing 16, no. 11 (2016): 1401–13. http://dx.doi.org/10.1002/wcm.2708.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

José, R. Nuñez Alvarez, Pérez Zamora Yelena, Benítez Pina Israel, and Noriega Angarita Eliana. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611–19. https://doi.org/10.11591/ijece.v11i1.pp611-619.

Повний текст джерела
Анотація:
Currently, the data and variables of a control system are the most important elements to be safeguarded in an industrial network, so it is vitally important to ensure their safety. This paper presents the design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Díaz Refinery in Santiago de Cuba, Cuba. In addition, the characteristics, configurations, methods, and rules of DMZs and firewalls are shown, select the configuration with three multi-legged firewalls as
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Toral-Cruz, Homero, Debiao He, Albena D. Mihovska, Kim-Kwang Raymond Choo, and Muhammad Khurram Khan. "Reliable and Secure e-Health Networks." Wireless Personal Communications 117, no. 1 (2021): 1–6. http://dx.doi.org/10.1007/s11277-021-08104-z.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Singh, Vikram, and Jaspal Ramola. "Secure Communications Over Wireless Broadcast Networks." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (2014): 01–05. http://dx.doi.org/10.53555/nneee.v1i4.244.

Повний текст джерела
Анотація:
Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications. In this paper wireless broadcast network model(WBN) with secrecy constraints is investigated, in which a source node broadcasts confidential message flows to user nodes, with each message intended to be decoded accurately by one user and to be kept secret from all other users. In the existing system we develope
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Dalskov, Anders, Daniel Escudero, and Marcel Keller. "Secure Evaluation of Quantized Neural Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 355–75. http://dx.doi.org/10.2478/popets-2020-0077.

Повний текст джерела
Анотація:
AbstractWe investigate two questions in this paper: First, we ask to what extent “MPC friendly” models are already supported by major Machine Learning frameworks such as TensorFlow or PyTorch. Prior works provide protocols that only work on fixed-point integers and specialized activation functions, two aspects that are not supported by popular Machine Learning frameworks, and the need for these specialized model representations means that it is hard, and often impossible, to use e.g., TensorFlow to design, train and test models that later have to be evaluated securely. Second, we ask to what e
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Qi, Yue, and Mojtaba Vaezi. "Secure Transmission in MIMO-NOMA Networks." IEEE Communications Letters 24, no. 12 (2020): 2696–700. http://dx.doi.org/10.1109/lcomm.2020.3016999.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Li, Bin, Zesong Fei, Yan Zhang, and Mohsen Guizani. "Secure UAV Communication Networks over 5G." IEEE Wireless Communications 26, no. 5 (2019): 114–20. http://dx.doi.org/10.1109/mwc.2019.1800458.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Dietzel, Stefan, Elmar Schoch, Bastian Konings, Michael Weber, and Frank Kargl. "Resilient secure aggregation for vehicular networks." IEEE Network 24, no. 1 (2010): 26–31. http://dx.doi.org/10.1109/mnet.2010.5395780.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Brennan, Rob, Kevin Feeney, Yuqian Song, and Declan O'Sullivan. "Secure federated monitoring of heterogeneous networks." IEEE Communications Magazine 51, no. 11 (2013): 63–71. http://dx.doi.org/10.1109/mcom.2013.6658654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Kang, Jiawen, Rong Yu, Sabita Maharjan, et al. "Toward secure energy harvesting cooperative networks." IEEE Communications Magazine 53, no. 8 (2015): 114–21. http://dx.doi.org/10.1109/mcom.2015.7180517.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Kim, Sung-Il, Il-Min Kim, and Jun Heo. "Secure Transmission for Multiuser Relay Networks." IEEE Transactions on Wireless Communications 14, no. 7 (2015): 3724–37. http://dx.doi.org/10.1109/twc.2015.2410776.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Williamson, J. "Review: Authentication Systems for Secure Networks." Computer Bulletin 39, no. 1 (1997): 27. http://dx.doi.org/10.1093/combul/39.1.27-a.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Curtmola, Reza, and Cristina Nita-Rotaru. "Secure multicast routing in wireless networks." ACM SIGMOBILE Mobile Computing and Communications Review 11, no. 2 (2007): 55–56. http://dx.doi.org/10.1145/1282221.1282233.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Chi-Chun Lo and Yu-Jen Chen. "Secure communication mechanisms for GSM networks." IEEE Transactions on Consumer Electronics 45, no. 4 (1999): 1074–80. http://dx.doi.org/10.1109/30.809184.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Byres, E. J. "Designing secure networks for process control." IEEE Industry Applications Magazine 6, no. 5 (2000): 33–39. http://dx.doi.org/10.1109/2943.863633.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Ganeriwal, Saurabh, Christina Pöpper, Srdjan Čapkun, and Mani B. Srivastava. "Secure Time Synchronization in Sensor Networks." ACM Transactions on Information and System Security 11, no. 4 (2008): 1–35. http://dx.doi.org/10.1145/1380564.1380571.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Von Solms, Basic. "Managing secure computer systems and networks." International Journal of Bio-Medical Computing 43, no. 1-2 (1996): 47–52. http://dx.doi.org/10.1016/s0020-7101(96)01226-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Costa, Gabriele, Pierpaolo Degano, and Fabio Martinelli. "Secure service orchestration in open networks." Journal of Systems Architecture 57, no. 3 (2011): 231–39. http://dx.doi.org/10.1016/j.sysarc.2010.09.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Avancha, Sasikanth, Jeffrey Undercoffer, Anupam Joshi, and John Pinkston. "Secure sensor networks for perimeter protection." Computer Networks 43, no. 4 (2003): 421–35. http://dx.doi.org/10.1016/s1389-1286(03)00352-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Choudhury, Ashish, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, and C. Pandu Rangan. "Secure message transmission in asynchronous networks." Journal of Parallel and Distributed Computing 71, no. 8 (2011): 1067–74. http://dx.doi.org/10.1016/j.jpdc.2011.03.004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Akhunzada, Adnan, Abdullah Gani, Nor Badrul Anuar, et al. "Secure and dependable software defined networks." Journal of Network and Computer Applications 61 (February 2016): 199–221. http://dx.doi.org/10.1016/j.jnca.2015.11.012.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

de la Piedra, Antonio, An Braeken, Abdellah Touhafi, and Karel Wouters. "Secure event logging in sensor networks." Computers & Mathematics with Applications 65, no. 5 (2013): 762–73. http://dx.doi.org/10.1016/j.camwa.2012.06.019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Dyer, Martin, Trevor Fenner, Alan Frieze, and Andrew Thomason. "On key storage in secure networks." Journal of Cryptology 8, no. 4 (1995): 189–200. http://dx.doi.org/10.1007/bf00191355.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Römmele, Stefan. "Automated Driving Calls for Secure Networks." ATZelektronik worldwide 10, no. 2 (2015): 12–17. http://dx.doi.org/10.1007/s38314-015-0517-x.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!