Search
for Topics
All Reviews
Browse All Reviews
>
Computer Systems Organization (C)
>
Computer-Communication Networks (C.2)
>
General (C.2.0)
> Security and Protection (C.2.0...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-10 of 373 Reviews about "
Security and Protection (C.2.0...)
":
Date Reviewed
ContraMTD: an unsupervised malicious network traffic detection method based on contrastive learning
Han X., Cui S., Qin J., Liu S., Jiang B., Dong C., Lu Z., Liu B. Proc. of the ACM Web Conference (WWW 2024)May 13-17, 2024) 1680-1689, 2024. Type: Proceedings
The methodology utilized in this study is innovative, as the procedure used to identify malicious network traffic involves an unsupervised method in contrastive learning. This unsupervised technique aims to surpass both supervised and unsupervised...
Jul 19 2024
Beginning AWS security: build secure, effective, and efficient AWS architecture
Penwell T., Apress, New York, NY, 2023. 152 pp. Type: Book (148429680X)
Beginning AWS security: build secure, effective, and efficient AWS architecture
is an essential guide for anyone looking to understand and implement security measures within Amazon Web Services (AWS). This book is particularly valuable for ...
Mar 4 2024
A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Tsao K., Girdler T., Vassilakis V. Ad Hoc Networks 1332022. Type: Article
FANET was coined for flying ad hoc networks, for example, unmanned aerial vehicles (UAVs). This survey paper is an in-depth discussion of the cybersecurity concerns and shortcomings unique to UAVs, as compared to more established mobile ad hoc net...
Feb 8 2024
Potential technologies and applications based on deep learning in the 6G networks
Zheng Z., Wang L., Zhu F., Liu L. Computers and Electrical Engineering 951-8, 2021. Type: Article
The sixth generation of cellular networks (6G) still hasn’t reached its peak in terms of hype, and in light of 4G and 5G coordinates and ruling experiences, concerned theorists are working to define 6G’s framework, use cases, potential...
Apr 4 2023
5G wireless: a comprehensive introduction
Stallings W., Pearson, Hoboken, NJ, 2021. 672 pp. Type: Book (978-1-367671-41-6)
The tremendous growth of mobile technology from first generation (1G) to fifth generation (5G) includes the development of mobile networks, user interfaces, and real-time implementation. The COVID-19 pandemic of the last couple years highlighted a...
Sep 20 2022
Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019. Type: Article
Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart ris...
Mar 8 2021
5G enabled secure wireless networks
Jayakody D., Srinivasan K., Sharma V., Springer International Publishing, New York, NY, 2019. 200 pp. Type: Book (978-3-030035-07-5)
Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standa...
Jan 15 2021
Big data privacy preservation for cyber-physical systems
Pan M., Wang J., Errapotu S., Zhang X., Ding J., Han Z., Springer International Publishing, New York, NY, 2019. 84 pp. Type: Book (978-3-030133-69-6)
This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading (where specific radio freque...
Nov 11 2020
Security, privacy and trust in the IoT environment
Mahmood Z., Springer International Publishing, New York, NY, 2019. 293 pp. Type: Book (978-3-030180-74-4)
I was pleased to review this book, edited by Zaigham Mahmood. The book is divided into two parts. The first part elaborates on different technologies and frameworks for security and privacy in the Internet of Things (IoT), whereas the ...
Aug 19 2020
Pro Azure governance and security: a comprehensive guide to Azure Policy, Blueprints, Security Center, and Sentinel
Tender P., Rendon D., Erskine S., Apress, New York, NY, 2019. 340 pp. Type: Book (978-1-484249-09-3)
The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts....
May 26 2020
Display
5
10
15
25
50
100
per page
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy