My first search was in the database of Computer Source and the search terms Network AND server management with the limiters to full text and peer reviewed. which resulted in a total of 55 journals to go over.
potential article: Siddiqui, A. J., & Boukerche, A. (2021). Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection. Computing, 103(6), 1209–1232. https://doi-org.ezproxy.fhsu.edu/10.1007/s00607-021-00912-2
the article mainly talks about using autoencoders to increase security measures on networks. the way they have the autoencoders setup is by making them detect network intrusions from unauthorized sources.
second search is in the same database. the terms were Network Attacks AND security. number of results was 49 with limiters of full text and peer reviewed.
Potential Article:Dewri, R., Ray, I., Poolsappasit, N., & Whitley, D. (2012). Optimal security hardening on attack tree models of networks: a cost-benefit analysis. International Journal of Information Security, 11(3), 167–188. https://doi-org.ezproxy.fhsu.edu/10.1007/s10207-012-0160-y
This article can be useful mainly because it goes over the security measures that make the network secured. the article does explore some of the simulated attacks on the network. it also goes over the cost vs benefits for increasing security on the network.
My last search used the same database with the search terms of Networking AND Security. with limiters on full text and peer review. the number of results was 92 articles.
potential article:RANAWEERA, P., JURCUT, A., & LIYANAGE, M. (2021). MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. ACM Computing Surveys, 9, 1–37. https://doi-org.ezproxy.fhsu.edu/10.1145/3474552
the article mainly talks about using 5G networking and the vulnerabilities to it. At the same time the article does talk about countermeasures that could be used to protect the network. which could come in handy since some equipment can use the 5G network.