Showing 1 - 20 results of 73 for search 'NETWORK SECURITY', query time: 0.67s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    by Abdullah Abdullah
    Published 2009-09-01
    ... (SMS messages). Short text messages are used in cellular networks. Compression is required for saving...
    Get full text
    Article
  5. 5
    by Makera Aziz, Dena Ahmed
    Published 2016-12-01
    Subjects: ...sql injection, network security, database security...
    Get full text
    Article
  6. 6
    by Baghdad Science Journal
    Published 2011-12-01
    Subjects: ...Hebbian Network, Neural Network, Text Security....
    Get full text
    Article
  7. 7
  8. 8
    by Lana Balyk, Jeff Pugh
    Published 2013-05-01
    Subjects: ...security...
    Get full text
    Article
  9. 9
    by Zaid Hussien et al.
    Published 2020-06-01
    Subjects: ...Deep Learning, Dropout, Feature Selection, Network Security, NIDS...
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
    Subjects: ...Apriori Algorithm ,Fp- Growth Algorithm , Data Mining, Network Security...
    Get full text
    Article
  14. 14
    by Tariq Fadil
    Published 2016-12-01
    ... chaotic neural network (CNN) algorithm was done. Both of quantized vector data and motion vector data have...
    Get full text
    Article
  15. 15
    by Ahmed Farhan, Fouad Awad, Saif Saad
    Published 2017-06-01
    ... designed and developed to achieve the security of information and/or network across the world. Cryptography...
    Get full text
    Article
  16. 16
    by Ahmed S. Farhan, Fouad H. Awad, Saif Saad
    Published 2017-06-01
    ... designed and developed to achieve the security of information and/or network across the world...
    Get full text
    Article
  17. 17
  18. 18
    by Maha Al-Badrani
    Published 2010-03-01
    Subjects: ...security...
    Get full text
    Article
  19. 19
    by Abdullah Abdullah
    Published 2009-03-01
    ...One of the key issues of modern cryptography is the problem of establishing a secure end-to-end...
    Get full text
    Article
  20. 20
    by Kassim Awad, Ali Sagheer, Ayoob Abdulhameed
    Published 2017-06-01
    Subjects: ...multimedia security; security; aes; rc4...
    Get full text
    Article