Dive into the top research papers on network security that offer comprehensive insights into safeguarding data and networks from cyber threats. These papers, penned by experts in the field, explore innovative techniques and strategies essential for maintaining secure networks. Whether you are an academic, professional, or enthusiast, these studies will provide valuable knowledge to enhance your understanding and application of network security.
Looking for research-backed answers?Try AI Search
The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the network.
Waleed Al Shehri
SSRN Electronic Journal
A survey of security issues in WSNs is presented, the state of the art in research on sensor network security is addressed, and some future directions for research are discussed.
Muhammad Jamshid Khan
World Journal of Advanced Research and Reviews
By implementing these methods, organizations can reduce the risk of data breaches, protect their reputation, and ensure the ongoing security of their network infrastructure.
Gurasis Singh, Harmanpreet Singh, Avinish Kumar Singh
SSRN Electronic Journal
Cryptography is the science of information security that includes techniques such as microdots, merging words with images, and other ways to hide in order in storage or transit.
their reoccurrence. NTT-CERT also feeds back the knowledge gained from such activities to research
Dingwang Wang, S. Ganesan
2021 IEEE International Conference on Electro Information Technology (EIT)
The vulnerability of CAN and Ethernet automotive buses is described and it is explained that Hardware Security Modules and Message Authentication Code (MAC) in CAN frame will increase security.
H. Sandberg, V. Gupta, K. Johansson
Annu. Rev. Control. Robotics Auton. Syst.
An attack space is introduced that illustrates how adversarial resources are allocated in some common attacks, and three types of attacks are described: false data injection, replay, and denial-of-service attacks.
Jifang Zhang
2022 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC)
Research on the security system of campus network will propose a security system structure with longitudinal anti-attack capability and diversified defence means, and adopt measures of application security, physical security, system security, network security and management security, etc to enhance the ability ofcampus network to resist attacks and serve the teaching and research work of universities in all aspects.
Bomin Mao, Jiajia Liu, Y. Wu + 1 more
IEEE Communications Surveys & Tutorials
How security and privacy can be destroyed by attacking one of the three technologies and how the three services support each other to realize efficient and achievable security protection is explained.
Asma Jahangeer, S. Bazai, Saad Aslam + 3 more
IEEE Access
A comprehensive review of internal attacks on the network layer is presented and a detailed analysis of machine learning-based algorithms and techniques proposed for the security of RPL protocol against internal attacks are presented.
Fatima Salahdine, Qiang Liu, Tao Han
IEEE Open Journal of the Computer Society
A deep review of the security issues threatening the network slicing and how to mitigate them over a multi-domain infrastructure in 5G networks is presented and the performance of some of these solutions in preventing malicious attacks is evaluated through experiments using Open Air Interface.
Dr. Manish Kumar, Prabhat Kumar
International Journal For Multidisciplinary Research
The different types of security threats, resources and vulnerabilities of computer systems are studied to study the different types of confidentiality, integrity and availability.
5G systems are expected to be more service-oriented, which suggests there will be an additional emphasis on security and privacy requirements that spawn from the new dimension of service-oriented security architecture.
Madhur Anil Borate, Ajay Narayan Panhale, Vijay Narayan Panhale + 2 more
International Journal for Research in Applied Science and Engineering Technology
This paper discussed about cryptography process, security mechanism, security services, attacks, types of cryptography, Steganography, and other ways to hide information in storage or transit.
This work will lead to the development of a hardware-independent framework for securing general quantum networks that allows developers to identify mandatory security mechanisms and incorporate additional security requirements of the clients during design of the networks.
Sudip Misra, Anandarup Mukherjee, Arijit Roy
Introduction to IoT
This article focuses on the practical networking aspects of security, which principally entail a networking perspective, and includes computer intrusion detection, traffic analysis, and network monitoring.
John A. Khan, M. Chowdhury
2021 IEEE International Conference on Electro Information Technology (EIT)
This paper shall provide an analysis of the security architectures of mobile connected networks, where these networks are susceptible in being compromised, popular attack techniques, and the mitigations against attacks.
Haijun Xu
International Journal of Frontiers in Sociology
Through the prediction of network security and privacy security situation, users can be more aware of the importance of Internet of things security andprivacy security, and hope to provide some help for the solution of InternetOfThings security and user privacy security.
Aliyyah Rosyidah, J. M. Parenreng
Internet of Things and Artificial Intelligence Journal
Several weaknesses in implementing this VPN protocol are identified, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider.
L. Mucchi, S. Jayousi, S. Caputo + 7 more
IEEE Open Journal of the Communications Society
The sixth generation (6G) of mobile network will be composed by different nodes, from macro- devices to nano- devices, providing a full connectivity fabric all around us, and physical-layer security (PLS) can act as a first line of defense, providing security even to low-resourced nodes in different environments.
Devika A. Verma, Vaishali Singh, B. N. + 3 more
2023 International Conference on Emerging Research in Computational Science (ICERCS)
This paper outlines the distinctive ESP modes and cipher suites, presenting how they may be used to defend data being despatched over a Wi-Fi community and explores the challenges associated with implementing and deploying ESP in wireless networks.
Pardeep Mehta
Journal of University of Shanghai for Science and Technology
As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks, and first came Intranets, which are password-protected sites designed for use only by company employees.
Patrick Lingga, J. Jeong, Jinhyuk Yang + 1 more
IEEE Transactions on Dependable and Secure Computing
A Security Policy Translator (SPT) is proposed to translate high-level security policies created by users into the corresponding low-level security policies for the I2NSF framework with high accuracy and speed.
Анастасия Дмитриевна Шилова, Anastasia D. Shilova, Anastasia D. Shilova — PhD Student
Scientific and Technical Journal of Information Technologies, Mechanics and Optics
The aim of the work is to formalize a fast computable network security metric intended for use in optimization problems aimed at rebuilding the network according to security requirements.
Kamaljeet Kaur, C. Prabha
2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)
The focus of this study is on investigating various methods for protecting the Internet of Things from energy- based attacks and a Genetic algorithm is suggested in this study.
N Bhagyasree, Nischal M R, Pavan Kumar + 1 more
International Journal of Advanced Research in Science, Communication and Technology
Introducing SDN into IoT will help IoT and stimulate IoT in people's regular lives and increases safety.
Manjinder Singh, Sarabjit Singh
Proceedings 25th Annual IEEE Conference on Local Computer Networks. LCN 2000
A secure broadcasting protocol in which only one packet is transmitted for every broadcast and the size of the broadcasted packet is small is proposed.
Huang Guang-rui
Computer Knowledge and Technology
The culture of human behavior Information Network introduced the culture of cybersecurity and composi-tion of background and the role of mechanisms is discussed.
James Lembke, Srivatsan Ravi, Pierre-Louis Roman + 1 more
ACM Transactions on Privacy and Security
Extensive experiments show that SERENE imposes minimal switch burden and scales to large networks running multiple network applications all requiring concurrent network updates, imposing at worst a 16% overhead on short-lived flow completion and negligible overhead on anticipated normal workloads.
Sanjaikanth E Vadakkethil Somanathan Pillai, Kiran Polimetla
2024 International Conference on Integrated Circuits and Communication Systems (ICICACS)
The open API in SDN also permits integration with gift-day protection answers, firewalls, and intrusion detection systems, similarly, to improving the community’s overall safety.
Purva Sharma, V. Bhatia, Shashi Prakash
Sensors (Basel, Switzerland)
A solution to protect networks against security attacks by employing quantum-secured blockchain in optical networks by combining quantum key distribution (QKD) with blockchain to enhance blockchain network security.
Satyandra Guthula, Navya Battula, Roman Beltiukov + 2 more
ArXiv
Developing generalizable ML-based solutions for disparate learning problems in network security is highly desired. However, despite a rich history of applying ML to network security, most existing solutions lack generalizability. This lack of progress can be attributed to an overreliance on supervised learning techniques and the associated challenges of curating well-specified labeled training data. This paper addresses a fundamental gap by introducing a novel transformer-based network foundation model, netFound. We employ self-supervised learning techniques on abundant, unlabeled network tele...
Hongyu Yang, Zixin Zhang, Lixia Xie + 1 more
International Journal of Intelligent Systems
The proposed NSSA method with network attack behavior classification (NABC) with features and advantages of a parallel feature extraction network, a bidirectional gate recurrent unit, and the attention mechanism proves that it can assess the overall situation of network security more effectively and comprehensively.
Milad Ghaznavi, Elaheh Jalalpour, M. A. Salahuddin + 3 more
IEEE Communications Surveys & Tutorials
This paper categorizes CDN security challenges per CDN infrastructure components, discusses possible countermeasures and their effectiveness, and delineates future research directions to identify important research challenges in this area.
Xuan Guang, Yang Bai, R. Yeung
2021 IEEE International Symposium on Information Theory (ISIT)
The model of secure network function computation, where a target function is required to be computed with zero error at a sink node over a network while being protected from a wiretapper, is put forward and a non-trivial upper bound on the secure computing capacity is proved.
Dimitrios-Georgios Akestoridis, P. Tague
2021 IEEE Conference on Communications and Network Security (CNS)
The architecture of a distributed system for monitoring the security of Zigbee networks, called HiveGuard is introduced and it is shown that it is possible for an outside attacker to completely deplete the energy of commercial Zigbee devices that are powered by one 3-volt CR2450 lithium battery in less than 16 hours.
Francesco Minna, Agathe Blaise, Filippo Rebecchi + 2 more
IEEE Security & Privacy
Container-orchestration software such as Kubernetes make it easy to deploy and manage modern cloud applications based on microservices, yet its network abstractions pave the way for "unexpected attacks" if the authors approach cloud network security with the same mental model of traditional network security.
Yi Wu, Nan Jiang, H. Pham + 5 more
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis
The findings include that existing LLMs and APR models fix very few Java vulnerabilities, and the results call for innovations to enhance automated Java vulnerability repair such as creating larger vulnerability repair training data, tuning LLMs with such data, and applying code simplification transformation to facilitate vulnerability repair.
Zicong Luo, Sheng Li, Guobiao Li + 2 more
Proceedings of the 31st ACM International Conference on Multimedia
A key-based FNNS scheme is proposed to improve the security of theFNNS, where key-controlled perturbations from the FNN for data embedding are generated, and this scheme is able to generate stego-images with higher visual quality than the state-of-the-art FNNs scheme, especially when the Fnn is a neural network for ordinary learning tasks.
M. Fuentes-García, J. Camacho, G. Maciá-Fernández
IEEE Access
This paper reviews the state-of-the-art in NSM, and derives a new taxonomy of the functionalities and modules in an NSM system, which is useful to assess current NSM deployments and tools for both researchers and practitioners.
J. R. N. Álvarez, Yelena Pérez Zamora, I. B. Pina + 1 more
International Journal of Electrical and Computer Engineering
The design and simulation of a demilitarized network (DMZ) using firewalls to control access to all the information that is stored in the servers of the industrial network of the Hermanos Diaz Refinery in Santiago de Cuba, Cuba is presented.
Junwei Zhang, Huamin Feng, Biao Liu + 1 more
Sensors (Basel, Switzerland)
A state-of-the-art study on NSSA is presented that can help bridge the current research status and future large-scale application, and focuses on the research progress of key technologies in recent years.
Xiaojing Luo
2023 International Conference on Networking, Informatics and Computing (ICNETIC)
This paper mainly starts from the overview of neural network and computer network, analyzes the application of Neural network in computer network security evaluation, and conducts in-depth research on computer networkSecurity evaluation simulation model of neuralnetwork for reference and improvement of the industry.
Sanjaikanth E Vadakkethil Somanathan Pillai, Kiran Polimetla
2024 International Conference on Integrated Circuits and Communication Systems (ICICACS)
Quantum cryptography has a notable effect on community defense by effectively mitigating the threat posed by quantum computing by effectively mitigating the threat posed by quantum computing.
Sabrina Ahmed, Mohammed Zamshed Ali
2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)
This paper proposes and analyzes an algorithm that helps decide different levels of security for different applications in the IoT network and introduces an application identifier in the packet header.
Jiwon Kim, Hamed Okhravi, D. Tian + 1 more
Communications of the ACM
Intent-based networking (IBN) offers advantages and opportunities compared with SDN, but IBN also poses new and unique security challenges that must be overcome.
M. Preetha, Dharmesh Dhabliya, Zeeshan Ahmad Lone + 3 more
2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)
This technical assessment evaluates the safety advantages of utilizing SSH in wireless networks and makes use of strong encryption algorithms consisting of AES and RSA to encrypt the whole communique session, ensuring that records is transmitted securely between devices.
Sammy de Figueiredo, Akash Madhusudan, Vincent Reniers + 2 more
Proceedings of the 36th Annual ACM Symposium on Applied Computing
This paper presents a brief overview of novel distributed storage platforms such as Storj and Sia, and provides two major contributions in the form of an architectural overview, as well as a high-level security exploration on the dev./test environment of StorJ, which resulted in the discovery of a DoS vulnerability.
C. Basile, D. Canavese, L. Regano + 2 more
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
A formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks is presented, designed to support policy refinement and policy translation and address useful, practical tasks in a vendor-independent manner.
Gorantla Naga Manoj Chowdary, Medapati Phani Sri Rama lakshmi, Yarababugari Nylu + 3 more
2023 International Conference on Inventive Computation Technologies (ICICT)
In this article, the function of ECC in network security is explained, and how ECC uses smaller keys for enhanced security and quick processing.