Showing 1 - 20 results of 1,949 for search 'NETWORK SECURITY', query time: 0.75s Refine Results
  1. 1
  2. 2
    by Zare Afifi, Saharnaz
    Published 2015
    Subjects: ...Computer networks -- Security measures...
    Get full text
  3. 3
    by Chun-WeiChen, 陳俊偉
    Published 2014
    ... Network security incidents frequently occur along with the rapid evolution of new cyber crimes. Breaches...
    Get full text
    Others
  4. 4
    by Nunnally, Troy J.
    Published 2015
    Subjects: ...Network security...
    Get full text
    Others
  5. 5
    by Brown, Thomas L.
    Published 2014
    ... security tools, to support Unix networks. The toolbox can be used to enhance system security, automating...
    Get full text
  6. 6
    by Moten, Daryl, Jambureskan, Sekaran
    Published 2014
    ... === This paper develops a Security Architecture for a network of telemetry networks as is envisioned for future...
    Get full text
  7. 7
    by Jingwei Wu, 吳經偉
    Published 2008
    ...碩士 === 國立交通大學 === 資訊科學與工程研究所 === 96 === Many researches have shown that overlay network...
    Get full text
    Others
  8. 8
    by Chih-ying Chang, 張知穎 
    Published 2008
    ... devices need to be connected in the networks. The “network security” issue has become important in recent...
    Get full text
    Others
  9. 9
    by Malhotra, Aanchal
    Published 2020
    Subjects: ...Network attacks...
    Get full text
  10. 10
    by Lim, Yu-Xi
    Published 2006
    Subjects: ...Network security...
    Get full text
    Others
  11. 11
  12. 12
    by Schively, Jody L.
    Published 2013
    ... firewall, obtained from Texas A&M, that can be installed and used to improve the network security between...
    Get full text
  13. 13
    by Hsu, Shih-Feng, 許世芬
    Published 2009
    ... the authentication mechanism with the IMS network. Moreover, for secure IMS service access, the MS should perform...
    Get full text
    Others
  14. 14
    by Lee, Chia-Yin, 李佳穎
    Published 2010
    ... in the global mobility network (GLOMONET); and (5) developing secure E-mail protocols for mobile devices...
    Get full text
    Others
  15. 15
    by Chi-Hsiang Hung, 洪吉祥
    Published 2013
    ... the network usage. That makes people to concern seriously about the network security. It is well known...
    Get full text
    Others
  16. 16
    by Yu-kuo Tseng, 曾昱國
    Published 2004
    ... to design an integrated network-security architecture so as to make information safer, proactively...
    Get full text
    Others
  17. 17
    by Wen-ping Lee, 李文平
    Published 2004
    ... rate technique, new response mechanism, an active network based security system - Active Network...
    Get full text
    Others
  18. 18
  19. 19
    by Jia-Ching Fang, 方家慶
    Published 2003
    ..., threats also increase. More and more foundations, companies and tools of computer network security emerge...
    Get full text
    Others
  20. 20
    by Wen-bin Hsieh, 謝文彬
    Published 2013
    ... or higher security strength. Finally, in mobile networks, we focus on the popular terminals, android based...
    Get full text
    Others