Funding Data Link References Status API Help
Page 1 of 1037548 results
Sort by: relevance publication year

Using targeted Bayesian network learning for suspect identification in communication networks

Journal Article published 8 Feb 2017 in International Journal of Information Security volume 17 issue 2 on pages 169 to 181

Authors: A. Gruber, I. Ben-Gal

Resistance and Security Index of Networks: Structural Information Perspective of Network Security

Journal Article published 3 Jun 2016 in Scientific Reports volume 6 issue 1

Authors: Angsheng Li, Qifu Hu, Jun Liu, Yicheng Pan

Security risk situation quantification method based on threat prediction for multimedia communication network

Journal Article published 15 Jan 2018 in Multimedia Tools and Applications

Research funded by National High Technology Research and Development Program of China (2012AA012704, 2015AA016006) | National Key Research and Development Program of China (2016YFF0204003) | The Equipment Pre-research Foundation during the 13th Five-Year Plan (61400020201) | CCF-Venus “Hongyan” research plan of China (2017003) | The Key Lab of Information Network Security, Ministry of Public Security (C15604)

Authors: Hao Hu, Hongqi Zhang, Yingjie Yang

Ensuring security in depth based on heterogeneous network security technologies

Journal Article published 24 Mar 2009 in International Journal of Information Security volume 8 issue 4 on pages 233 to 246

Authors: Meharouech Sourour, Bouhoula Adel, Abbes Tarek

Scientific Research and Security Measures

Journal Article published Apr 1950 in Nature volume 165 issue 4200 on pages 657 to 659

International Scientific Relations and National Security

Journal Article published Dec 1952 in Nature volume 170 issue 4338 on pages 1033 to 1036

Metaphors advance scientific research

Journal Article published Oct 2013 in Nature volume 502 issue 7471 on pages 303 to 303

Authors: Andrea Loettgers

Criminal network investigation

Journal Article published 2014 in Security Informatics volume 3 issue 1 on page 1

Authors: Uffe Wiil

Complete analysis of configuration rules to guarantee reliable network security policies

Journal Article published 16 Oct 2007 in International Journal of Information Security volume 7 issue 2 on pages 103 to 122

Authors: J. G. Alfaro, N. Boulahia-Cuppens, F. Cuppens

Rigorous automated network security management

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 29 to 48

Authors: Joshua D. Guttman, Amy L. Herzog