Статті в журналах з теми "System and network security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "System and network security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zhou, Wanlei, and Yang Xiang. "Network and system security." Journal of Network and Computer Applications 32, no. 2 (March 2009): 345–46. http://dx.doi.org/10.1016/j.jnca.2008.06.001.
Повний текст джерелаHe, Shen, Jing Huang, and Penglin Yang. "Build with intrinsic security: Trusted autonomy security system." International Journal of Distributed Sensor Networks 16, no. 11 (November 2020): 155014772097453. http://dx.doi.org/10.1177/1550147720974535.
Повний текст джерелаGanzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.
Повний текст джерелаMegat Mohamed Noor, Megat Norulazmi. "Community based home security system using wireless mesh network." International Journal of Academic Research 5, no. 5 (October 10, 2013): 73–79. http://dx.doi.org/10.7813/2075-4124.2013/5-5/a.9.
Повний текст джерелаKozlov, Dmitriy, and Natalia Sadovnikova. "Security System of POS-Network." NBI Technologies 14, no. 1 (September 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.1.1.
Повний текст джерелаAdamczyk, Piotr, Grzegorz Kiryk, Jarosław Napiórkowski, and Andrzej Walczak. "Network model of security system." MATEC Web of Conferences 76 (2016): 02002. http://dx.doi.org/10.1051/matecconf/20167602002.
Повний текст джерелаWhite, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.
Повний текст джерелаRöpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.
Повний текст джерелаMcDonald, Kenneth, Joshua Akers, Forrest Bartz, Daniel Beck, Israel Castro, and LTC Robert Prins. "Food Security Network Modeling." Industrial and Systems Engineering Review 4, no. 2 (November 12, 2016): 114–30. http://dx.doi.org/10.37266/iser.2016v4i2.pp114-130.
Повний текст джерелаB N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.
Повний текст джерелаSatria, Deni, Alde Alanda, Aldo Erianda, and Deddy Prayama. "Network Security Assessment Using Internal Network Penetration Testing Methodology." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (October 6, 2018): 360. http://dx.doi.org/10.30630/joiv.2.4-2.190.
Повний текст джерелаZhang, De Gang, Yi Wu, Wen Bing Zhang, De Hai Zhang, and Shao Quan Zhang. "The Design of a Physical Network Isolation System." Applied Mechanics and Materials 687-691 (November 2014): 2192–95. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2192.
Повний текст джерелаENNERT, Michal, Branislav MADOŠ, and Zuzana DUDLÁKOVÁ. "DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS." Acta Electrotechnica et Informatica 14, no. 4 (December 1, 2014): 13–16. http://dx.doi.org/10.15546/aeei-2014-0034.
Повний текст джерелаZhang, Ya Na, Li Han, and Xin Cao. "Design of Network Information Security System." Advanced Materials Research 1022 (August 2014): 257–60. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.257.
Повний текст джерелаMa, Jie, and Shuanbao Li. "The Construction Method of Computer Network Security Defense System Based on Multisource Big Data." Scientific Programming 2022 (May 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/7300977.
Повний текст джерелаGuynes, Carl S., Yu Andy Wu, and John Windsor. "E-Commerce/Network Security Considerations." International Journal of Management & Information Systems (IJMIS) 15, no. 2 (March 21, 2011): 1. http://dx.doi.org/10.19030/ijmis.v15i2.4147.
Повний текст джерелаZhou, Jian, Shan Shan Li, and Wei Jie Tan. "The Research of Tri-Networks Integration Security Control System." Advanced Materials Research 268-270 (July 2011): 1012–16. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1012.
Повний текст джерелаJia, Ling. "Campus Network Security Program Based on Snort Network Security Intrusion Detection System." Advanced Materials Research 433-440 (January 2012): 3235–40. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.3235.
Повний текст джерелаXiangya Tao, Changyun Jia, and Cheng Yang. "Security Analysis on China Campus Network and Construction on Network Security System." Journal of Convergence Information Technology 6, no. 11 (November 30, 2011): 166–74. http://dx.doi.org/10.4156/jcit.vol6.issue11.19.
Повний текст джерелаJo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.
Повний текст джерелаXing, Yanbo. "Design of a Network Security Audit System Based on Log Data Mining." Wireless Communications and Mobile Computing 2022 (February 25, 2022): 1–7. http://dx.doi.org/10.1155/2022/6737194.
Повний текст джерелаEle, Bassey, Umoh, E. E., and Egete, D. O. "Development of an Improved Network Security System using Firewall for Securing Organisational Data." Transactions on Networks and Communications 8, no. 5 (October 31, 2020): 01–09. http://dx.doi.org/10.14738/tnc.85.9605.
Повний текст джерелаWang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.
Повний текст джерелаPrashar, Deepak, Nishant Jha, Muhammad Shafiq, Nazir Ahmad, Mamoon Rashid, Shoeib Amin Banday, and Habib Ullah Khan. "Blockchain-Based Automated System for Identification and Storage of Networks." Security and Communication Networks 2021 (February 19, 2021): 1–7. http://dx.doi.org/10.1155/2021/6694281.
Повний текст джерелаZhiyong Shan and Vinod Namboodiri. "Design and Implementation of A Network Security Management System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 20 (September 10, 2020): 95–108. http://dx.doi.org/10.24297/ijct.v20i.8841.
Повний текст джерелаYushmanov, Anton А. "DEVELOP A COMPREHENSIVE SECURITY SYSTEM." Interexpo GEO-Siberia 7, no. 1 (July 8, 2020): 140–48. http://dx.doi.org/10.33764/2618-981x-2020-7-1-140-148.
Повний текст джерелаAbd, Nuha, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "Intelligent Intrusion Detection System in Internal Communication Systems for Driverless Cars." Webology 17, no. 2 (December 21, 2020): 376–93. http://dx.doi.org/10.14704/web/v17i2/web17039.
Повний текст джерелаLi, Bin, Qinglei Zhou, Xueming Si, and Jinhua Fu. "Mimic Encryption System for Network Security." IEEE Access 6 (2018): 50468–87. http://dx.doi.org/10.1109/access.2018.2869174.
Повний текст джерелаXiang, Yang, Jiankun Hu, and Wanlei Zhou. "Advances in network and system security." Concurrency and Computation: Practice and Experience 24, no. 10 (February 29, 2012): 1035–36. http://dx.doi.org/10.1002/cpe.2810.
Повний текст джерелаShkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.
Повний текст джерелаWang, Shanshan, and Yun Chen. "Optimization of Wireless Sensor Network Architecture with Security System." Journal of Sensors 2021 (November 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7886639.
Повний текст джерелаProf. Krishnakumar L, Prof Krishnakumar L., and Nisha Mariam Varughese. "Intrusion Detection Using Collaborative Network Security Management System in Cloud Computing." Indian Journal of Applied Research 4, no. 3 (October 1, 2011): 145–47. http://dx.doi.org/10.15373/2249555x/mar2014/42.
Повний текст джерелаSun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.
Повний текст джерелаFan, Yi Xing, and Ren Bing Zhang. "Research on Network Security and Identity Authentication." Advanced Materials Research 926-930 (May 2014): 2046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2046.
Повний текст джерелаAlimi, Isiaka Ajewale. "Effective Multi-Layer Security for Campus Network." Journal of Communications Technology, Electronics and Computer Science 2 (November 21, 2015): 6. http://dx.doi.org/10.22385/jctecs.v2i0.18.
Повний текст джерелаDong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Повний текст джерелаQi, Lizhong, Chunhui Zhao, Gao Yu, and Jiarui Xue. "Application of network security situational awareness in power information system security." Journal of Physics: Conference Series 2202, no. 1 (June 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2202/1/012042.
Повний текст джерелаDunn, Cheryl L., Gregory J. Gerard, and James L. Worrell. "Evaluation of Network Operating System Security Controls." Issues in Accounting Education 18, no. 3 (August 1, 2003): 291–306. http://dx.doi.org/10.2308/iace.2003.18.3.291.
Повний текст джерелаWu, Xin Min, and Hao Shu Wu. "Based on IPv6 Network and 4G Network System Security Analysis and Research." Applied Mechanics and Materials 530-531 (February 2014): 773–76. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.773.
Повний текст джерелаWang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.
Повний текст джерелаSifawa, Muazu Dalhatu, Bello Alhaji Buhari, and Lawal Sulaiman. "Deployment of Snort Intrusion Detection System on Usmanu Danfodiyo University Network." International Journal of Advanced Networking and Applications 14, no. 02 (2022): 5408–12. http://dx.doi.org/10.35444/ijana.2022.14212.
Повний текст джерелаZhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.
Повний текст джерелаGarcía-Cobo, Iván. "Quantum Network Intelligent Management System." Optics 3, no. 4 (November 15, 2022): 430–37. http://dx.doi.org/10.3390/opt3040036.
Повний текст джерелаGuan, Tian, Yi Han, Nan Kang, Ningye Tang, Xu Chen, and Shu Wang. "An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles." Sustainability 14, no. 9 (April 26, 2022): 5211. http://dx.doi.org/10.3390/su14095211.
Повний текст джерелаChandran, Anjana S. "Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308306.
Повний текст джерелаJi, Jun, Fei Fei Xing, and Jun Du. "The Design of Protection Security System of University Educational Information System." Advanced Materials Research 962-965 (June 2014): 3063–66. http://dx.doi.org/10.4028/www.scientific.net/amr.962-965.3063.
Повний текст джерелаSelvamani, D., and V. Selvi. "A Literature Survey on the Importance of Intrusion Detection System for Wireless Networks." Asian Journal of Computer Science and Technology 7, no. 3 (November 5, 2018): 20–27. http://dx.doi.org/10.51983/ajcst-2018.7.3.1905.
Повний текст джерелаMuwardi, Rachmat, Hongmin Gao, Harun Usman Ghifarsyam, Mirna Yunita, Andika Arrizki, and Julpri Andika. "Network Security Monitoring System Via Notification Alert." Journal of Integrated and Advanced Engineering (JIAE) 1, no. 2 (November 30, 2021): 113–22. http://dx.doi.org/10.51662/jiae.v1i2.22.
Повний текст джерелаSulaiman, Oris Krianto. "ANALYSIS OF NETWORK SECURITY SYSTEM USING THE SWITCH PORT SECURITY." Computer Engineering, Science and System Journal 1, no. 1 (January 31, 2016): 9–14. http://dx.doi.org/10.24114/cess.v1i1.4036.
Повний текст джерелаJesudoss, Sofiya, Auxeeliya Jesudoss, and Ashraph Sulaiman. "An Adaptive Approach to Improve the Accuracy of Packet Pre-Filtering." Advanced Materials Research 367 (October 2011): 241–48. http://dx.doi.org/10.4028/www.scientific.net/amr.367.241.
Повний текст джерела