Showing 1 - 20 results of 38 for search 'NETWORK SECURITY', query time: 0.98s Refine Results
  1. 1
    by Cai, Songlin
    Published 2005
    ...This dissertation studies several security issues in data networks, to reveal the vulnerability...
    Get full text
  2. 2
    by Chasaki, Danai
    Published 2012
    ... of heterogeneous embedded devices that are, more often than not, interconnected. Security in the field of networked...
    Get full text
  3. 3
    by Xia, Jianhong
    Published 2007
    ... various strategies for securing enterprise networks and Internet infrastructure. The Internet consists...
    Get full text
  4. 4
    by Natarajan, Sriram
    Published 2012
    ... virtualization provides an opportunity to host a network that can guarantee such high-levels of security features...
    Get full text
  5. 5
    by Park, Se Hyun
    Published 1999
    ...Multimedia Wireless Local Area Networks (MWLANs) supporting various applications require secure...
    Get full text
  6. 6
  7. 7
  8. 8
    by Ben Saied, Yosra
    Published 2013
    Subjects: ...Wireless sensor networks...
    Get full text
    Get full text
  9. 9
  10. 10
  11. 11
  12. 12
    by Song, Yang
    Published 2013
    ...The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks...
    Get full text
  13. 13
    by Liu, Zugang
    Published 2008
    ... to national security and prosperity. The identification of new connections between distinct network systems...
    Get full text
  14. 14
    by Marquez, Erika
    Published 2012
    ...Since at least the terrorist attacks of September 11, 2001, security has emerged as a major...
    Get full text
  15. 15
    by Nahum, Erich M
    Published 1997
    ...Networked information systems have seen explosive growth in the last few years...
    Get full text
  16. 16
    by Shanbhag, Shashank
    Published 2012
    ... philosophy of the Internet (globally deployed network layer, isolation of protocol layers). This has resulted...
    Get full text
  17. 17
    by Huang, Xin
    Published 2010
    ..., novel applications, and security and manageability challenges require networks to provide a broad range...
    Get full text
  18. 18
  19. 19
  20. 20
    by Matsypura, Dmytro
    Published 2006
    ..., network theory, and other tools that have been recently proposed for the modeling and analysis of supply...
    Get full text