Browsing by Subject
Computer networks--Security measures
Showing results 1 to 11 of 11
Issue Date | Title | Author(s) |
2004 | Analysis of intrusion prevention methods | Semerci, Hakan |
2005 | An analysis of key generation efficiency of RSA cryptosystem in distributed environments | Çağrıcı, Gökhan |
1999 | An approch to the security problems in the TCP/IP protocol suite for a network security monitor design | Mutaf, Pars |
2002 | Comparison of recovery requirements with investigation requirements for intrusion management systems | Arpaçay Tapucu, Dilek |
2002 | Development of a quality assurance prototype for intrusion detection systems | Yüksel, Ulaş |
2001 | A firewall design for academic environments | Tok, Metin |
2005 | Firewall monitoring using intrusion detection systems | Asarcıklı, Şükran |
2013 | Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme | Aslanoğlu, Rabia |
2005 | Improving misuse detection with neural networks | Demiray, Sadettin |
2002 | Standards and practices necessary to implement a successful security review program for intrusion management systems | Doruk, Alpay |
2006 | Statistical methods used for intrusion detection | Özardıç, Onur |