Funding Data Link References Status API Help
Page 1 of 1034733 results
Sort by: relevance publication year

Using targeted Bayesian network learning for suspect identification in communication networks

Journal Article published 8 Feb 2017 in International Journal of Information Security volume 17 issue 2 on pages 169 to 181

Authors: A. Gruber, I. Ben-Gal

Resistance and Security Index of Networks: Structural Information Perspective of Network Security

Journal Article published 3 Jun 2016 in Scientific Reports volume 6 issue 1

Authors: Angsheng Li, Qifu Hu, Jun Liu, Yicheng Pan

Ensuring security in depth based on heterogeneous network security technologies

Journal Article published 24 Mar 2009 in International Journal of Information Security volume 8 issue 4 on pages 233 to 246

Authors: Meharouech Sourour, Bouhoula Adel, Abbes Tarek

International Scientific Relations and National Security

Journal Article published Dec 1952 in Nature volume 170 issue 4338 on pages 1033 to 1036

Metaphors advance scientific research

Journal Article published Oct 2013 in Nature volume 502 issue 7471 on pages 303 to 303

Authors: Andrea Loettgers

Criminal network investigation

Journal Article published 2014 in Security Informatics volume 3 issue 1 on page 1

Authors: Uffe Wiil

Complete analysis of configuration rules to guarantee reliable network security policies

Journal Article published 16 Oct 2007 in International Journal of Information Security volume 7 issue 2 on pages 103 to 122

Authors: J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens

Rigorous automated network security management

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 29 to 48

Authors: Joshua D. Guttman, Amy L. Herzog

Game strategies in network security

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 71 to 86

Authors: Kong-wei Lye, Jeannette M. Wing

The Conceptual and Scientific Demarcation of Security in Contrast to Safety

Journal Article published 7 Nov 2017 in European Journal for Security Research

Authors: S. H. Jore

Sensor Guardian: prevent privacy inference on Android sensors

Journal Article published 8 Jun 2017 in EURASIP Journal on Information Security volume 2017 issue 1

Research funded by Tsinghua University Initiative Scientific Research Program (2014z09102)

Authors: Xiaolong Bai, Jie Yin, Yu-Ping Wang

Feature selection for text classification: A review

Journal Article published 8 May 2018 in Multimedia Tools and Applications

Research funded by National Natural Science Foundation of China (61363009, U1736203,61732021,61472165,61373158) | National Key R&D Plan of China (2017YFB0802203) | Guangdong Provincial Engineering Technology Research Center on Network Security Detection and Defense (2014B090904067) | Guangdong Provincial Special Funds for Applied Technology Research and Development and Transformation of Important Scientific and Technological Achieve (2016B010124009) | Zhuhai Top Discipline-Information Security | Guangzhou Key Laboratory of Data Security and Privacy Preserving | Guangdong Key Laboratory of Data Security and Privacy Preserving | National Joint Engineering Research Center of Network Security Detection and Protection Technology

Authors: Xuelian Deng, Yuqing Li, Jian Weng, Jilian Zhang

Report: Security Management Convergence via SIM (Security Information Management)—A Requirements Perspective

Journal Article published Mar 2004 in Journal of Network and Systems Management volume 12 issue 1 on pages 137 to 144

Authors: Diana Kelley

Moving AHEAD with an international human epigenome project

Journal Article published Aug 2008 in Nature volume 454 issue 7205 on pages 711 to 715

Authors: The American Association for Cancer Research Human Epigenome Task Force, European Union, Network of Excellence, Scientific Advisory Board

The sound of tumor cell-microenvironment communication – composed by the Cancer Cluster Salzburg research network

Journal Article published 2 Jun 2017 in Cell Communication and Signaling volume 15 issue 1

Authors: Silja Wessler, Fritz Aberger, Tanja N. Hartmann

Application and research of clustering fusion algorithm in communication network prediction

Journal Article published 28 Feb 2018 in Cluster Computing

Authors: Xiaolei Li

Metazoans evolved by taking domains from soluble proteins to expand intercellular communication network

Journal Article published 29 Apr 2015 in Scientific Reports volume 5 issue 1

Authors: Hyun-Jun Nam, Inhae Kim, James U. Bowie, Sanguk Kim

Erratum: Corrigendum: Communication activity in a social network: relation between long-term correlations and inter-event clustering

Journal Article published 6 Nov 2015 in Scientific Reports volume 5 issue 1

Authors: Diego Rybski, Sergey V. Buldyrev, Shlomo Havlin, Fredrik Liljeros, Hernán A. Makse

Communication activity in a social network: relation between long-term correlations and inter-event clustering

Journal Article published 6 Aug 2012 in Scientific Reports volume 2 issue 1

Authors: Diego Rybski, Sergey V. Buldyrev, Shlomo Havlin, Fredrik Liljeros, Hernán A. Makse

Towards 5G cellular network forensics

Journal Article published 11 Jul 2018 in EURASIP Journal on Information Security volume 2018 issue 1

Authors: Filipo Sharevski