Sr no. | Topic Name | IEEE |
---|---|---|
22 | Summary of Research on IT Network and Industrial Control Network Security Assessment Read Abstact & get paper Ask from Whatsapp |
2019 |
26 | A LSTM-Based Method for Comprehension and Evaluation of Network Security Situation Read Abstact & get paper Ask from Whatsapp |
2019 |
28 | Towards a fully automated and optimized network security functions orchestration Read Abstact & get paper Ask from Whatsapp |
2019 |
30 | User Profiling Based on Application-Level Using Network Metadata Read Abstact & get paper Ask from Whatsapp |
2019 |
31 | A survey on security threats and authentication approaches in wireless sensor networks Read Abstact & get paper Ask from Whatsapp |
2018 |
33 | Research of Computer Network Security Evaluation Based on Backpropagation Neural Network Read Abstact & get paper Ask from Whatsapp |
2019 |
35 | MapReduce Approach to Build Network User Profiles with Top-k Rankings for Network Security Read Abstact & get paper Ask from Whatsapp |
2018 |
37 | Network Security Situation Prediction Based on Long Short-Term Memory Network Read Abstact & get paper Ask from Whatsapp |
2019 |
38 | Improving Wireless Network Security Based On Radio Fingerprinting Read Abstact & get paper Ask from Whatsapp |
2019 |
40 | Multi-Dimension Threat Situation Assessment Based on Network Security Attributes Read Abstact & get paper Ask from Whatsapp |
2018 |
42 | Research and Implementation of Security Technology in Campus Network Construction Read Abstact & get paper Ask from Whatsapp |
2019 |
44 | IDS Based Network Security Architecture with TCP/IP Parameters using Machine Learning Read Abstact & get paper Ask from Whatsapp |
2018 |
45 | Research on Node Routing Security Scheme Based on Dynamic Reputation Value in Content Centric Networks Read Abstact & get paper Ask from Whatsapp |
2019 |
46 | Real-Time Early Warning of Network Security Threats Based on Improved Ant Colony Algorithm Read Abstact & get paper Ask from Whatsapp |
2019 |
47 | Enabling Cyber Security Data Sharing for Large-scale Enterprises Using Managed Security Services Read Abstact & get paper Ask from Whatsapp |
2018 |
48 | Software Defined Security Architecture with Deep Learning-Based Network Anomaly Detection Module Read Abstact & get paper Ask from Whatsapp |
2019 |
49 | The Network Security Classified Protection System Construction of Meteorological Observation Center of China Meteorological Administration Read Abstact & get paper Ask from Whatsapp |
2019 |
50 | Network security testing tools for SMEs (small and medium enterprises) Read Abstact & get paper Ask from Whatsapp |
2018 |
51 | CSSS: Cyber security simulation service for software defined tactical networks Read Abstact & get paper Ask from Whatsapp |
2018 |
52 | Complex Networks Monitoring and Security and Fraud Detection for Enterprises Read Abstact & get paper Ask from Whatsapp |
2019 |
53 | Security Analysis of Open Source Network Access Control in Virtual Networks Read Abstact & get paper Ask from Whatsapp |
2018 |
54 | IPsec/Firewall Security Policy Analysis: A Survey Read Abstact & get paper Ask from Whatsapp |
2018 |
55 | Research on key technology of network security situation awareness of private cloud in enterprises Read Abstact & get paper Ask from Whatsapp |
2018 |
56 | Securing OpenFlow Controller of Software-Defined Networks using Bayesian Network Read Abstact & get paper Ask from Whatsapp |
2019 |
57 | Performance Evaluation and Analysis of various Network Security tools Read Abstact & get paper Ask from Whatsapp |
2019 |
58 | Performance Evaluation and Analysis of various Network Security tools Read Abstact & get paper Ask from Whatsapp |
2020 |
60 | Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network Read Abstact & get paper Ask from Whatsapp |
2018 |
62 | Study on a Decision Method for Reconfiguration of Network Security Functions Based on Privilege Transition Graph Read Abstact & get paper Ask from Whatsapp |
2018 |
65 | Research on Campus Network Security Management Technology Based on Big Data Read Abstact & get paper Ask from Whatsapp |
2019 |
66 | Design and Implementation of a New Intelligent Substation Network Security Defense System Read Abstact & get paper Ask from Whatsapp |
2019 |
68 | Wireless Network Security Detection System Design Based on Client Read Abstact & get paper Ask from Whatsapp |
2018 |
70 | ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control Read Abstact & get paper Ask from Whatsapp |
2018 |
71 | Combining Machine Learning and Behavior Analysis Techniques for Network Security Read Abstact & get paper Ask from Whatsapp |
2020 |
73 | A Network Coding Optimization Scheme for Niche Algorithm based on Security Performance Read Abstact & get paper Ask from Whatsapp |
2019 |
74 | Research on a Pattern-Matching Algorithm for the Network Security System Read Abstact & get paper Ask from Whatsapp |
2018 |
77 | SDX-based security collaboration: Extending the security reach beyond network domains Read Abstact & get paper Ask from Whatsapp |
2018 |
82 | Early Detection of Network Incident Using Open Security Information Read Abstact & get paper Ask from Whatsapp |
2018 |
84 | An Improved K-means Algorithm Based on Intersection over Union for Network Security Read Abstact & get paper Ask from Whatsapp |
2019 |
86 | Analysis of Various Trust based Security Algoithm for the Vehicular AD-HOC Network Read Abstact & get paper Ask from Whatsapp |
2018 |
87 | Digital Ant Mechanism and Its Application in Network Security Read Abstact & get paper Ask from Whatsapp |
2019 |
88 | Integration of Multiple IP Domains in Low-Cost and Security-Oriented Small Networks Read Abstact & get paper Ask from Whatsapp |
2018 |
90 | Network Security Based on D-S Evidence Theory Optimizing CS-BP Neural Network Situation Assessment Read Abstact & get paper Ask from Whatsapp |
2018 |
91 | Providing Security in Vehicular Adhoc Network using Cloud Computing by secure key Method Read Abstact & get paper Ask from Whatsapp |
2018 |
93 | OFMTL-SEC: State-based Security for Software Defined Networks Read Abstact & get paper Ask from Whatsapp |
2018 |
94 | Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures Read Abstact & get paper Ask from Whatsapp |
2018 |
1130 | A COMPREHENSIVE STUDY ON ONLINE MCQ EXAMINATION PORTAL A SURVEY Read Abstact & get paper Ask from Whatsapp |
NON IEEE -2021 |
1131 | A Review On Different Attacks And Ways To Mitigate Them In Order To Enhance Network Security Read Abstact & get paper Ask from Whatsapp |
NON IEEE -2021 |
Sr no. | Topic Name | IEEE |