Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Decision Tree Model-Based Security Situational Awareness Approach for Wireless Communication Networks

  • articleNo Access

    Analysis of the Role of Artificial Intelligence in Enhancing the Network Security Protection of Renewable Energy Systems

  • articleNo Access

    Abnormal Network User Detection Method based on the Hybrid Neural Network from the Perspective of Multimodal Data Fusion

  • articleNo Access

    A DISCRETE MATHEMATICAL MODEL TO SIMULATE MALWARE SPREADING

  • articleNo Access

    Performance Evaluation of Data-Centric Networks Based on Parallel and Distributed Architectures for Machine Intelligence Research

  • articleNo Access

    TOWARDS AN ONTOLOGY MAPPING APPROACH FOR SECURITY MANAGEMENT

  • articleOpen Access

    FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS CORRELATION WITH NETWORK SECURITY

    Fractals14 Feb 2022
  • articleOpen Access

    APPLICATION OF FRACTAL NEURAL NETWORK IN NETWORK SECURITY SITUATION AWARENESS

    Fractals17 Feb 2022
  • articleNo Access

    A Novel, User-Level, Security-On-Demand Paradigm for ATM Networks: Modeling, Simulation, and Performance Analysis

  • articleNo Access

    EFFICIENT AND SECURE AUTONOMOUS SYSTEM BASED TRACEBACK

  • articleNo Access

    Anomaly Detection Using Hybrid Neuro Genetic Model

  • articleNo Access

    An ISM-based Analysis Method on the Influencing Factors of Network Security Situation (NSS)

  • articleNo Access

    INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS

  • articleNo Access

    Efficient Cybersecurity Model Using Wavelet Deep CNN and Enhanced Rain Optimization Algorithm

  • articleNo Access

    DDoS ATTACK DETECTION METHODS BASED ON DEEP LEARNING IN HEALTHCARE

  • articleNo Access

    MULTIOBJECTIVE DECISION SUPPORT IN IT-RISK MANAGEMENT

  • articleNo Access

    Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks

  • articleNo Access

    Harmony search Hawks optimization-based Deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization

  • articleNo Access

    QKD NETWORKS WITH PASSIVE OPTICAL ELEMENTS: ANALYSIS AND ASSESSMENT

  • articleNo Access

    Graph Theory and Classifying Security Events in Grid Security Gateways