검색어 : 통합검색[Applied network security monitoring :]
총 624건 중 624건 출력
, 5/63 페이지
-
41
-
A security monitoring method for malicious P2P event detection
-
Jung, Hyun Mi;
Hwang, Il-Sun;
Moon, Jeong-Kyung;
Park, Hark- Soo;
;
(Peer-to-peer networking and applications,
v.9,
2016,
pp.498-507)
-
42
-
A distributed energy monitoring network system based on data fusion via improved PSO
-
Sung, W.T.;
Chung, H.Y.;
;
(Measurement : journal of the International Measurement Confederation,
v.55,
2014,
pp.362-374)
-
43
-
Research on Critical Technologies of Remote Monitoring and Control for Special Electromechanical Equipment
-
ZHANG, Guangming;
TU, Shandong;
GONG, Jianming;
College of Automation, Nanjing University of Technology;
School of Mechanical & Power Engineering, East China University of Science & Technology;
College of Automation, Nanjing University of Technology;
(中國安全科學學報 = China safety science journal,
v.16,
2006,
pp.135-140)
-
44
-
A Survey Study on Standard Security Models in Wireless Sensor Networks
-
Lee, Sang Ho;
Software Engineering, Chungbuk University;
(중소기업융합학회논문지 = Journal of Convergence Society for SMB,
v.4,
2014,
pp.31-36)
-
45
-
MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring
-
Tao Qin;
Xiaohong Guan;
Chenxu Wang;
Zhaoli Liu;
Minist. of Educ. Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China;
Minist. of Educ. Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China;
Minist. of Educ. Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China;
Minist. of Educ. Key Lab. for Intell. Networks & Network Security, Xi'an Jiaotong Univ., Xi'an, China;
(IEEE systems journal,
v.9,
2015,
pp.1322-1333)
-
46
-
병렬 TCP 통신을 이용한 스마트폰 실시간 스트리밍 서비스
-
김장영;
Department of Computer Science, The University of Suwon;
(한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering,
v.20,
2016,
pp.937-941)
-
47
-
Campus Network Security Intrusion Detection Based on Feature Segmentation and Deep Learning
-
Chen Zhe;
;
(Journal of Cyber Security and Mobility,
v.,
2024,
pp.775-802)
-
48
-
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System
-
Masduki Bisyron Wahyudi;
Ramli Kalamullah;
Murfi Hendri;
;
(International Journal of Communication Networks and Information Security (IJCNIS),
v.10,
2022,
)
-
49
-
Application of wireless sensor network in telemedicine monitoring
-
Ni Haoyu;
College of Electronic Information, Sichuan University, Chengdu, Sichuan, 610065, China;
(Applied and Computational Engineering,
v.5,
2023,
pp.470-474)
-
50
-
ML-Based 5G Network Slicing Security: A Comprehensive Survey
-
Dangi, Ramraj;
Jadhav, Akshay;
Choudhary, Gaurav;
Dragoni, Nicola;
Mishra, Manas Kumar;
Lalwani, Praveen;
School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India;
School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India;
DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark;
DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark, DK-2800 Kongens Lyngby, Denmark;
School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India;
School of Computing Science and Engineering, VIT Bhopal University, Bhopal 466114, India;
(Future internet,
v.14,
2022,
pp.116)