Found: 32 resources
Design and Implementation of a Proposal Network Firewall
Al-Khwarizmi Engineering Journal, 2006, Volume 2, Issue 1, Pages 52-69
Enhancement of Intrusion Detection Using Back Propagation Algorithm
Journal Of AL-Turath University College, 2010, Volume , Issue 9, Pages 159-171
AN IMPROVED DATA CONFIDENTIALITY PROTOCOL BASED ON TIMESTAMP
IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2012, Volume 12, Issue 1, Pages 53-59
A Survey on Network Security Monitoring: Tools and Functionalities
Mustansiriyah journal of pure and applied sciences, 2023, Volume 1, Issue 2, Pages 55-86
An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN
Iraqi Journal for Electrical And Electronic Engineering, 2023, Volume 19, Issue 2, Pages 8-17
Zero-Day Vulnerabilities: Unveiling the Threat Landscape in Network Security
Mesopotamian Journal of CyberSecurity, 2022, Volume 2022, Issue VOL 2, Pages 57-63
Challenges and Future Directions for Intrusion Detection Systems Based on AutoML
Mesopotamian Journal of CyberSecurity, 2021, Volume 2021, Issue VOL 1, Pages 16-21
Securing Wireless Sensor Network (WSN) Using Embedded Intrusion Detection Systems
Iraqi Journal for Electrical And Electronic Engineering, 2012, Volume 8, Issue 1 & 2, Pages 54-64
An Ontological Approach to Secure Address Resolution Protocol
AL-MANSOUR JOURNAL, 2014, Volume , Issue 21, Pages 59-75
An Adaptive Intrusion Detection System by using Decision Tree
Journal of Al-Qadisiyah for Computer Science and Mathematics, 2018, Volume 10, Issue 2, Pages 88-96 Comp