Projects Inventory

Research Projects Ideas Network Security

Network Security Research Projects Ideas, Topics and Areas

Latest and New Network Security Research Topics Areas and Ideas for writing the research paper and thesis for Master MS and Ph.program.

1. Cryptography and network security
2. Network security and contagion
3. Introduction to network security: theory and practice
4. An improved quantitative evaluation method for network security
5. Computer network security and technology research
6. Strategies for network security
7. Evolving defense mechanism for future network security
8. Intrusion detection system using deep neural network for in-vehicle network security
9. A first step toward network security virtualization: From concept to prototype
10. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things
11. Enhancing network security through software defined networking (SDN)
12. Network security: private communication in a public world
13. New security architecture for IoT network
14. A survey of P2P Network security
15. Enabling network security through active DNS datasets
16. A survey on wireless security: Technical challenges, recent advances, and future trends
17. Performance evaluation of selection methods of genetic algorithm and network security concerns
18. A survey on wireless body area network: Security technology and its design methodology issue
19. Physical layer network security in the full-duplex relay system
20. A taxonomy for attack graph generation and usage in network security
21. Efficient provisioning of security service function chaining using network security defense patterns
22. The study of network security with its penetrating attacks and possible security mechanisms
23. Network security situation prediction: A review and discussion
24. Virtual network security: threats, countermeasures, and challenges
25. Don’t forget to lock the back door! A characterization of IPv6 network security policy
26. Network security challenges in Android applications
27. Lecture Notes on “Computer and Network Security”
28. Game-theoretic foundations for the strategic use of honeypots in network security
29. Compliance, network, security and the people related factors in cloud ERP implementation
30. Straddling the next cyber frontier: The empirical analysis on network security, exploits, and vulnerabilities
31. Towards micro-segmentation in 5G network security
32. A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm
33. Pin it! Improving Android network security at runtime
34. Wireless sensor network security enhancement using directional antennas: state of the art and research challenges
35. Computation, cryptography, and network security
36. Cloud belief rule base model for network security situation prediction
37. A hybrid cryptography technique for improving network security
38. SEADE: Countering the futility of network security
39. The research and application of multi-firewall technology in enterprise network security
40. A survey of security in software-defined networks
41. On the computation of centrality metrics for network security in mesh networks
42. Smartwalk: Enhancing social network security via adaptive random walks
43. Advance hybrid key management architecture for SCADA network security
44. Enabling security functions with SDN: A feasibility study
45. The CAPEC based generator of attack scenarios for network security evaluation
46. What the GDPR means for businesses
47. High performance and high scalable packet classification algorithm for network security systems
48. Two-factor authentications for secured login in support of effective information preservation and network security
49. Network security protocol for constrained resource devices in Internet of things
50. Resistance and security index of networks: Structural information perspective of network security
51. Evolution of wireless sensor network security
52. The big data security challenge
53. Quantifying security risk by measuring network risk conditions
54. Robust representation for domain adaptation in network security
55. Analysis and study of network security at transport layer
56. Complete network security protection for SME’s within limited resources
57. Enhancing multi-user network security using sagacity and dismissal of conquered movements (SDCM)
58. Game-theoretic algorithms for optimal network security hardening using attack graphs
59. Simplifying urban network security games with cut-based graph contraction
60. A study on network security monitoring for the hybrid classification-based intrusion prevention systems
61. Value of corrective network security for distributed energy storage applications
62. Network security risk analysis using improved MulVAL Bayesian attack graphs
63. Internet of Things (IoT): Taxonomy of security attacks
64. Software-defined networking security: pros and cons
65. QoSE: Quality of security a network security framework with distributed NFV
66. New algorithm for wireless network communication security
67. Ransomware attacks: detection, prevention and cure
68. Connected cars–the next targe tfor hackers
69. Survey on cyberspace security
70. A survey of wireless sensor network security and routing techniques
71. Investigating the work practices of network security professionals
72. Next generation wireless network security and privacy
73. A novel network security algorithm based on encrypting text into a white-page image
74. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network
75. Physical-layer security in evolving optical networks
76. Evaluating and selecting the biometrics in network security
77. A deep learning approach for network intrusion detection system
78. Attacking the baseband modem of mobile phones to breach the users’ privacy and network security
79. Conceptual model for security in next generation network
80. Open source model and simulator for real-time performance analysis of automotive network security
81. A security and trust framework for virtualized networks and software‐defined networking
82. Network security situation assessment based on HMM-MPGA
83. Exploiting curse of diversity for improved network security
84. Comparison deep learning method to traditional methods using for network intrusion detection
85. Sensemaking and Storytelling: Network Security Strategies for Collaborative Groups
86. System and network security: anomaly detection and monitoring
87. DDoS goes mainstream: how headline-grabbing attacks could make this threat an organisation’s biggest nightmare
88. An approach to network security evaluation of computer network information system with triangular fuzzy information
89. A novel adaptive grey verhulst model for network security situation prediction
90. A Text Mining-Based Anomaly‎ Detection Model in Network Security
91. Security of self-organizing networks: MANET, WSN, WMN, VANET
92. Issues and options in the economic regulation of European Network Security
93. Building a framework for network security situation awareness
94. A theory of network security: Principles of natural selection and combinatorics
95. Deep learning approach for network intrusion detection in software defined networking
96. Data security for software as a service
97. A survey of security attacks, defenses and security mechanisms in wireless sensor network
98. Network security situation assessment: A review and discussion
99. Taxonomic modeling of security threats in software defined networking
100. Network security as public good: A mean-field-type game theory approach

Advertisement
Advertisement
Advertisement
Exit mobile version