| Sr no. | Topic Name | IEEE |
|---|---|---|
| 22 | Summary of Research on IT Network and Industrial Control Network Security Assessment Read Abstact & get paper Ask from Whatsapp |
2019 |
| 26 | A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation Read Abstact & get paper Ask from Whatsapp |
2019 |
| 28 | Towards a fully automated and optimized network security functions orchestration Read Abstact & get paper Ask from Whatsapp |
2019 |
| 30 | User Profiling Based on Application-Level Using Network Metadata Read Abstact & get paper Ask from Whatsapp |
2019 |
| 31 | A survey on security threats and authentication approaches in wireless sensor networks Read Abstact & get paper Ask from Whatsapp |
2018 |
| 33 | Research of Computer Network Security Evaluation Based on Backpropagation Neural Network Read Abstact & get paper Ask from Whatsapp |
2019 |
| 35 | MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security Read Abstact & get paper Ask from Whatsapp |
2018 |
| 37 | Network Security Situation Prediction Based on Long Short-Term Memory Network Read Abstact & get paper Ask from Whatsapp |
2019 |
| 38 | Improving Wireless Network Security Based On Radio Fingerprinting Read Abstact & get paper Ask from Whatsapp |
2019 |
| 40 | Multi-Dimension Threat Situation Assessment Based on Network Security Attributes Read Abstact & get paper Ask from Whatsapp |
2018 |
| 42 | Research and Implementation of Security Technology in Campus Network Construction Read Abstact & get paper Ask from Whatsapp |
2019 |
| 44 | IDS Based Network Security Architecture with TCP/IP Parameters using Machine Learning Read Abstact & get paper Ask from Whatsapp |
2018 |
| 45 | Research on Node Routing Security Scheme Based on Dynamic Reputation Value in Content Centric Networks Read Abstact & get paper Ask from Whatsapp |
2019 |
| 46 | Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm Read Abstact & get paper Ask from Whatsapp |
2019 |
| 47 | Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services Read Abstact & get paper Ask from Whatsapp |
2018 |
| 48 | Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module Read Abstact & get paper Ask from Whatsapp |
2019 |
| 49 | The Network Security Classified Protection System Construction of Meteorological Observation Center of China Meteorological Administration Read Abstact & get paper Ask from Whatsapp |
2019 |
| 50 | Network security testing tools for SMEs (small and medium enterprises) Read Abstact & get paper Ask from Whatsapp |
2018 |
| 51 | CSSS: Cyber security simulation service for software defined tactical networks Read Abstact & get paper Ask from Whatsapp |
2018 |
| 52 | Complex Networks Monitoring and Security and Fraud Detection for Enterprises Read Abstact & get paper Ask from Whatsapp |
2019 |
| 53 | Security Analysis of Open Source Network Access Control in Virtual Networks Read Abstact & get paper Ask from Whatsapp |
2018 |
| 54 | IPsec/Firewall Security Policy Analysis: A Survey Read Abstact & get paper Ask from Whatsapp |
2018 |
| 55 | Research on key technology of network security situation awareness of private cloud in enterprises Read Abstact & get paper Ask from Whatsapp |
2018 |
| 56 | Securing OpenFlow Controller of Software-Defined Networks using Bayesian Network Read Abstact & get paper Ask from Whatsapp |
2019 |
| 57 | Performance Evaluation and Analysis of various Network Security tools Read Abstact & get paper Ask from Whatsapp |
2019 |
| 58 | Performance Evaluation and Analysis of various Network Security tools Read Abstact & get paper Ask from Whatsapp |
2020 |
| 60 | Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network Read Abstact & get paper Ask from Whatsapp |
2018 |
| 62 | Study on a Decision Method for Reconfiguration of Network Security Functions Based on Privilege Transition Graph Read Abstact & get paper Ask from Whatsapp |
2018 |
| 65 | Research on Campus Network Security Management Technology Based on Big Data Read Abstact & get paper Ask from Whatsapp |
2019 |
| 66 | Design and Implementation of a New Intelligent Substation Network Security Defense System Read Abstact & get paper Ask from Whatsapp |
2019 |
| 68 | Wireless Network Security Detection System Design Based on Client Read Abstact & get paper Ask from Whatsapp |
2018 |
| 70 | ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control Read Abstact & get paper Ask from Whatsapp |
2018 |
| 71 | Combining Machine Learning and Behavior Analysis Techniques for Network Security Read Abstact & get paper Ask from Whatsapp |
2020 |
| 73 | A Network Coding Optimization Scheme for Niche Algorithm based on Security Performance Read Abstact & get paper Ask from Whatsapp |
2019 |
| 74 | Research on a Pattern-Matching Algorithm for the Network Security System Read Abstact & get paper Ask from Whatsapp |
2018 |
| 77 | SDX-based security collaboration: Extending the security reach beyond network domains Read Abstact & get paper Ask from Whatsapp |
2018 |
| 82 | Early Detection of Network Incident Using Open Security Information Read Abstact & get paper Ask from Whatsapp |
2018 |
| 84 | An Improved K-means Algorithm Based on Intersection over Union for Network Security Read Abstact & get paper Ask from Whatsapp |
2019 |
| 86 | Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network Read Abstact & get paper Ask from Whatsapp |
2018 |
| 87 | Digital Ant Mechanism and Its Application in Network Security Read Abstact & get paper Ask from Whatsapp |
2019 |
| 88 | Integration of Multiple IP Domains in Low-Cost and Security-Oriented Small Networks Read Abstact & get paper Ask from Whatsapp |
2018 |
| 90 | Network Security Based on D-S Evidence Theory Optimizing CS-BP Neural Network Situation Assessment Read Abstact & get paper Ask from Whatsapp |
2018 |
| 91 | Providing Security in Vehicular Adhoc Network using Cloud Computing by secure key Method Read Abstact & get paper Ask from Whatsapp |
2018 |
| 93 | OFMTL-SEC: State-based Security for Software Defined Networks Read Abstact & get paper Ask from Whatsapp |
2018 |
| 94 | Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures Read Abstact & get paper Ask from Whatsapp |
2018 |
| 1130 | A COMPREHENSIVE STUDY ON ONLINE MCQ EXAMINATION PORTAL A SURVEY Read Abstact & get paper Ask from Whatsapp |
NON IEEE -2021 |
| 1131 | A Review On Different Attacks And Ways To Mitigate Them In Order To Enhance Network Security Read Abstact & get paper Ask from Whatsapp |
NON IEEE -2021 |
| Sr no. | Topic Name | IEEE |