projectwale

ProjectwaleCode

Network security table

IDPROJECT NAMEIEEE
1131A-Review-On-Different-Attacks-And-Ways-To-Mitigate-Them-In-Order-To-Enhance-Network-SecurityNON IEEE -2021
1130A-COMPREHENSIVE-STUDY-ON-ONLINE-MCQ-EXAMINATION-PORTAL--A-SURVEYNON IEEE -2021
94Attacking-Network-Isolation-in-Software-Defined-Networks:-New-Attacks-and-Countermeasures2018
93OFMTL-SEC:-State-based-Security-for-Software-Defined-Networks2018
91Providing-Security-in-Vehicular-Adhoc-Network-using-Cloud-Computing-by-secure-key-Method2018
90Network-Security-Based-on-D-S-Evidence-Theory-Optimizing-CS-BP-Neural-Network-Situation-Assessment2018
88Integration-of-Multiple-IP-Domains-in-Low-Cost-and-Security-Oriented-Small-Networks2018
87Digital-Ant-Mechanism-and-Its-Application-in-Network-Security2019
86Analysis-of-Various-Trust-based-Security-Algoithm-for-the-Vehicular-AD-HOC-Network2018
84An-Improved-K-means-Algorithm-Based-on-Intersection-over-Union-for-Network-Security2019
82Early-Detection-of-Network-Incident-Using-Open-Security-Information2018
77SDX-based-security-collaboration:-Extending-the-security-reach-beyond-network-domains2018
74Research-on-a-Pattern-Matching-Algorithm-for-the-Network-Security-System2018
73A-Network-Coding-Optimization-Scheme-for-Niche-Algorithm-based-on-Security-Performance2019
71Combining-Machine-Learning-and-Behavior-Analysis-Techniques-for-Network-Security2020
70ACE-of-Spades-in-the-IoT-Security-Game:-A-Flexible-IPsec-Security-Profile-for-Access-Control2018
68Wireless-Network-Security-Detection-System-Design-Based-on-Client2018
66Design-and-Implementation-of-a-New-Intelligent-Substation-Network-Security-Defense-System2019
65Research-on-Campus-Network-Security-Management-Technology-Based-on-Big-Data2019
62Study-on-a-Decision-Method-for-Reconfiguration-of-Network-Security-Functions-Based-on-Privilege-Transition-Graph2018
60Exploiting-Social-Tie-and-SIR-Characteristic-for-Cooperative-Jamming:-A-Game-Model-in-a-Two-layer-Network2018
58Performance-Evaluation-and-Analysis-of-various-Network-Security-tools2020
57Performance-Evaluation-and-Analysis-of-various-Network-Security-tools2019
56Securing-OpenFlow-Controller-of-Software-Defined-Networks-using-Bayesian-Network2019
55Research-on-key-technology-of-network-security-situation-awareness-of-private-cloud-in-enterprises2018
54IPsec/Firewall-Security-Policy-Analysis:-A-Survey2018
53Security-Analysis-of-Open-Source-Network-Access-Control-in-Virtual-Networks2018
52Complex-Networks-Monitoring-and-Security-and-Fraud-Detection-for-Enterprises2019
51CSSS:-Cyber-security-simulation-service-for-software-defined-tactical-networks2018
50Network-security-testing-tools-for-SMEs-(small-and-medium-enterprises)2018
49The-Network-Security-Classified-Protection-System-Construction-of-Meteorological-Observation-Center-of-China-Meteorological-Administration2019
48Software-Defined-Security-Architecture-with-Deep-Learning-Based-Network-Anomaly-Detection-Module2019
47Enabling-Cyber-Security-Data-Sharing-for-Large-scale-Enterprises-Using-Managed-Security-Services2018
46Real-Time-Early-Warning-of-Network-Security-Threats-Based-on-Improved-Ant-Colony-Algorithm2019
45Research-on-Node-Routing-Security-Scheme-Based-on-Dynamic-Reputation-Value-in-Content-Centric-Networks2019
44IDS-Based-Network-Security-Architecture-with-TCP/IP-Parameters-using-Machine-Learning2018
42Research-and-Implementation-of-Security-Technology-in-Campus-Network-Construction2019
40Multi-Dimension-Threat-Situation-Assessment-Based-on-Network-Security-Attributes2018
38Improving-Wireless-Network-Security-Based-On-Radio-Fingerprinting2019
37Network-Security-Situation-Prediction-Based-on-Long-Short-Term-Memory-Network2019
35MapReduce-Approach-to-Build-Network-User-Profiles-with-Top-k-Rankings-for-Network-Security2018
33Research-of-Computer-Network-Security-Evaluation-Based-on-Backpropagation-Neural-Network2019
31A-survey-on-security-threats-and-authentication-approaches-in-wireless-sensor-networks2018
30User-Profiling-Based-on-Application-Level-Using-Network-Metadata2019
28Towards-a-fully-automated-and-optimized-network-security-functions-orchestration2019
26A-LSTM-Based-Method-for-Comprehension-and-Evaluation-of-Network-Security-Situation2019
22Summary-of-Research-on-IT-Network-and-Industrial-Control-Network-Security-Assessment2019
Select your currency
INR Indian rupee

Till 30th january all developed project in 3000 INR.