-
1
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
2
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial–temporal modelling
Published 2023-07-01Subjects: “…computer network security…”
Get full text
Article -
3
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
Published 2025-01-01Subjects: Get full text
Article -
4
A Lightweight Mitigation Technique Against a Modified Version Number Attack in IoT Networks
Published 2025-01-01Subjects: Get full text
Article -
5
-
6
SDN TCP-SYN Dataset: A dataset for TCP-SYN flood DDoS attack detection in software-defined networksMendeley Data
Published 2025-04-01Subjects: Get full text
Article -
7
PaySwitch: Smart Contract-Based Payment Switch for Off-Chain Payment Channel Networks
Published 2025-01-01Subjects: Get full text
Article -
8
PCA mix‐based Hotelling's T2 multivariate control charts for intrusion detection system
Published 2022-05-01Subjects: “…computer network security…”
Get full text
Article -
9
Efficient anomaly detection in tabular cybersecurity data using large language models
Published 2025-01-01Subjects: Get full text
Article -
10
FWA-SVM Network Intrusion Identification Technology for Network Security
Published 2025-01-01Subjects: Get full text
Article -
11
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Subjects: Get full text
Article -
12
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: “…Network security…”
Get full text
Article -
13
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01Subjects: Get full text
Article -
14
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
15
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: “…computer and network security…”
Get full text
Article -
16
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning
Published 2022-05-01Subjects: Get full text
Article -
17
Principles of Information Security /
Published 2016Subjects: “…Computer networks Security measures. 6783…”
View in OPAC
Book -
18
Securing the Clicks : network security in the age of social media /
Published 2012Subjects: “…Computer networks Security measures. 8590…”
View in OPAC
Book -
19