Treffer 1 - 20 von 928

1

A performance evaluation framework for post-quantum TLS.
Montenegro, José A. ; Rios, Ruben ; Lopez-Cerezo, Javier
Future Generation Computer Systems. Feb2026, Vol. 175, pN.PAG-N.PAG. 1p.

Cryptography Secure Sockets Layer (Co... Evaluation research
Fachzeitschrift
2

Detecting TLS Protocol Anomalies Through Network Monitoring and Compliance Tools.
Berbecaru, Diana Gratiela ; De Santo, Marco
Future Internet; Jan2026, Vol. 18 Issue 1, p62, 24p

INTRUSION detection syst... ANOMALY detection (Compu... SECURE Sockets Layer (Co... COMPUTER software securi... COMPUTER network monitor...
Fachzeitschrift
3

CNNRes-DIndRNN: A New Method for Detecting TLS-Encrypted Malicious Traffic.
Zhang, Jinsha ; Wang, Xiaoying ; Li, Chunhui ; et al.
Future Internet; Jan2026, Vol. 18 Issue 1, p8, 29p

DEEP learning CONVOLUTIONAL neural net... SECURE Sockets Layer (Co... ARTIFICIAL neural networ... TRAFFIC monitoring MACHINE learning
Fachzeitschrift
4

Enhancing Network Intrusion Detection for TLS Traffic Using Deep Learning.
Muttaqien, Hidayatul ; Niswar, Muhammad ; Syarif, Syafruddin ; et al.
Engineering, Technology & Applied Science Research; Dec2025, Vol. 15 Issue 6, p28530-28536, 7p

DEEP learning CONVOLUTIONAL neural net... REAL-time computing ANOMALY detection (Compu... INTERNET security SECURE Sockets Layer (Co...
Fachzeitschrift
5

QUIC on the Fast Lane: Extending Performance Evaluations on High-rate Links.
Kempf, Marcel ; Jaeger, Benedikt ; Zirngibl, Johannes ; et al.
Computer Communications. Jul2024, Vol. 223, p90-100. 11p.

Programming languages Secure Sockets Layer (Co... Multiplexing Internet traffic Tunnel design & construc...
Fachzeitschrift
6

Privacy-preserving communication in smart city transportation using elliptic curve cryptography.
Mohammed, Zainab Khalid ; Mohammed, Mazin Abed ; Ghani, Mohd Khanapi Abd ; et al.
Scientific Reports; 10/2/2025, Vol. 15 Issue 1, p1-17, 17p

DATA security ELLIPTIC curve cryptogra... SMART cities INTERNET of things SECURE Sockets Layer (Co... CYBER physical systems
Fachzeitschrift
7

Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis.
Lastre, Jhury Kevin ; Ko, Yongho ; Kwon, Hoseok ; et al.
Sensors (14248220); Oct2025, Vol. 25 Issue 19, p6144, 33p

5G networks COMPUTER security vulner... RESEARCH protocols COMPUTER network protoco... SECURE Sockets Layer (Co... NETWORK performance
Fachzeitschrift
8

An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL.
Menandas, Josepha ; Subaja, Mary
International Arab Journal of Information Technology (IAJIT). Sep2025, Vol. 22 Issue 5, p859-872. 14p.

Data security Elliptic curve cryptogra... Data protection Data security failures Authentication (Law) Secure Sockets Layer (Co...
Fachzeitschrift
9

Top GoDaddy alternatives of 2024: Find the best web host for your site here.
Haan, Katherine
Fortune.com. 11/6/2024, pN.PAG-N.PAG. 1p.

Business planning Secure Sockets Layer (Co... Internet protocols Central processing units Web hosting Data plans
Zeitschrift
10

EveryDollar budgeting app review September 2024.
Haan, Katherine
Fortune.com. 9/21/2024, pN.PAG-N.PAG. 1p.

Personal finance Secure Sockets Layer (Co... Data security failures Budget Banking industry Asset-liability manageme...
Zeitschrift
11

Quantum-resistant Transport Layer Security.
Rubio García, Carlos ; Rommel, Simon ; Takarabt, Sofiane ; et al.
Computer Communications. Jan2024, Vol. 213, p345-358. 14p.

Secure Sockets Layer (Co... Public key cryptography Telecommunication system... Cyberterrorism Quantum computing Computer network securit...
Fachzeitschrift
12

OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification.
Bader, Ofek ; Lichy, Adi ; Dvir, Amit ; et al.
Computer Communications. Jan2024, Vol. 213, p271-284. 14p.

Secure Sockets Layer (Co... Quality of service Internet traffic Encryption protocols Machine learning Classification
Fachzeitschrift
13

Finding More Than One Worm in the Apple.
BLAND, MIKE
Communications of the ACM. Jul2014, Vol. 57 Issue 7, p58-64. 7p. 1 Color Photograph, 1 Diagram, 4 Charts.

Secure Sockets Layer (Co... Cyberterrorism C (Computer program lang... Databases Computer industry Psychological vulnerabil...
Zeitschrift
14

COMPANIES TO WATCH 2024: PRO AUDIO EDITION.
Mix (0164-9957). Jan2024, Vol. 48 Issue 1, p34-38. 5p.

Secure Sockets Layer (Co... Senior leadership teams Sound studios Loudspeakers iPhone (Smartphone) Voyages around the world
Zeitschrift
15

Redtail review August 2024: Features, integrations and more.
Jolaoso-Oloyede, Christiana
Fortune.com. 8/3/2024, pN.PAG-N.PAG. 1p.

Businesspeople Secure Sockets Layer (Co... Small business Event management Financial planners Investment advisors
Zeitschrift
16

Web hosting costs: Understand plans, prices, and fees you might not have thought about.
Haan, Katherine
Fortune.com. 7/19/2024, pN.PAG-N.PAG. 1p.

Businesspeople Secure Sockets Layer (Co... Web development Checking accounts Choice (Psychology)
Zeitschrift
17

An Effective Federated Learning Approach for Secure and Private Scalable Intrusion Detection on the Internet of Vehicles.
Alwash, Wisam Makki ; Kara, Mustafa ; Aydin, Muhammed Ali ; et al.
Concurrency & Computation: Practice & Experience; 7/25/2025, Vol. 37 Issue 15-17, p1-27, 27p

FEDERATED learning DATA privacy SECURE Sockets Layer (Co... CYBERTERRORISM FEATURE selection INTRUSION detection syst...
Fachzeitschrift
18

Performance Evaluation of SSL/TLS Handshake Latency in Distributed Web Service Architectures.
Kumar, T. M. Sathish
International Journal of Communication & Computer Technologies (IJCCTS); 2025, Vol. 13 Issue 2, p32-39, 8p

SECURE Sockets Layer (Co... CRYPTOGRAPHY BENCHMARK problems (Comp... COMPUTER network protoco... WEB services KEY agreement protocols...
Fachzeitschrift
19

Ant Media Server Enterprise Edition.
Freeman, Derrick
Streaming Media. Sep/Oct2023, Vol. 20 Issue 5, p50-57. 8p.

Secure Sockets Layer (Co... Ants Bit rate
Zeitschrift
20

Bitrix24 review May 2024: Features, integrations and more.
Keary, Time
Fortune.com. 5/19/2024, pN.PAG-N.PAG. 1p.

Secure Sockets Layer (Co... General Data Protection... Business hours Health Insurance Portabi... Cloud storage Data plans
Zeitschrift

Filter