Academic literature on the topic 'Computer networks – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer networks – Security measures"
Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textNIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.
Full textHewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.
Full textMo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.
Full textSavytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (December 29, 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.
Full textLittlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textGuo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.
Full textZhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.
Full textZhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textDissertations / Theses on the topic "Computer networks – Security measures"
LU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.
Full textKing-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.
Full textBailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.
Full textBenbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.
Full textMartina, Jean Everson. "Verification of security protocols based on multicast communication." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609650.
Full textKalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Full textSanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.
Full textTyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Full textDong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.
Full textDavis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.
Full textOne of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable.
Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems.
In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
Books on the topic "Computer networks – Security measures"
John, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.
Find full textTeumim, David J. Industrial network security. 2nd ed. Research Triangle Park, NC: ISA, 2010.
Find full textOram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.
Find full textHunt, Craig. Network Security. Sebastopol, CA: O’Reilly Media, 1998.
Find full textBhatnagar, Kartik. Cisco security. Cincinnati, Ohio: Premier Press, 2002.
Find full textHorton, Mike. Network security portable reference. New York: McGraw-Hill, 2003.
Find full textR, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.
Find full textMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Find full textVacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Sudbury, Mass: Jones and Bartlett Publishers, 2010.
Find full textChristmas, Paul. Network security manager. Oxford, England: Elsevier Advanced Technology, 1992.
Find full textBook chapters on the topic "Computer networks – Security measures"
Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks, 596–631. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Full textWilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science, 53–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.
Full textStepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science, 233–48. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.
Full textZhou, Yanjun. "Analysis of Computer Network Management Measures in University Library." In Cyber Security Intelligence and Analytics, 936–40. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_136.
Full textParwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 301–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.
Full textRohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 224–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.
Full textWang, Bin, Long Guo, and Peng Xu. "Computer Network Security and Preventive Measures Based on Big Data Technology." In Advances in Intelligent Systems and Computing, 656–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4572-0_94.
Full textWallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops, 384–402. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.
Full textZheng, Changliang. "Computer Network Security and Effective Measures for the Era of Big Data." In Application of Big Data, Blockchain, and Internet of Things for Education Informatization, 521–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87903-7_64.
Full textDeng, Lei, Haiping Li, and Fanchun Li. "Information Security Risk and Protective Measures of Computer Network in Big Data Age." In Communications in Computer and Information Science, 699–708. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5577-0_56.
Full textConference papers on the topic "Computer networks – Security measures"
Zheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Full textMeng, Qingbao. "Computer Network Information Security and Protection Measures." In 2017 7th International Conference on Mechatronics, Computer and Education Informationization (MCEI 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/mcei-17.2017.193.
Full textWang, Zhongdong, Liuqiang Wu, and Liangjing Zhang. "A Discussion on Computer Security Technology and Security Preventive Measures." In ICNSER 2022: The 3rd International Conference On Industrial Control Network And System Engineering Research. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3556055.3556063.
Full textZhou, Enfeng. "On Computer Network Security Management and Technical Measures." In 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016). Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/icence-16.2016.37.
Full textPeng, Ying. "Analysis of Computer Network Security Problems and Preventive Measures." In 2017 7th International Conference on Mechatronics, Computer and Education Informationization (MCEI 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/mcei-17.2017.72.
Full textChen, Yefeng, and Zhengxu Chen. "Preventive Measures of Influencing Factors of Computer Network Security Technology." In 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA). IEEE, 2021. http://dx.doi.org/10.1109/icaica52286.2021.9498242.
Full textFang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.
Full textNikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.
Full textLiao, Peng. "Computer Network Information Security Protection Measures Based on AI Intelligent Technology." In ICITEE2020: The 3rd International Conference on Information Technologies and Electrical Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3452940.3453070.
Full textLai, Min, and Tao Chen. "Research on Computer Network Information Technology Security and the Preventive Measures." In 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/macmc-17.2018.8.
Full textReports on the topic "Computer networks – Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.
Full textChristie, Lorna, and Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, August 2018. http://dx.doi.org/10.58248/pn584.
Full textSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.
Full textMehra, Tanya, and Julie Coleman. The Role of the UN Security Council in Countering Terrorism & Violent Extremism: The Limits of Criminalization? RESOLVE Network, October 2022. http://dx.doi.org/10.37805/sfi2022.4.
Full textPinson, Lauren. Addressing the Linkages Between Illicit Arms, Organized Crime and Armed Conflict. UNIDIR, September 2022. http://dx.doi.org/10.37559/caap/22/pacav/10.
Full textIn Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, March 2022. http://dx.doi.org/10.1061/infographic.000003.
Full textData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full text