Suggested Topics within your search.
Suggested Topics within your search.
Network security
82
QA75 Electronic computers. Computer science
79
TK Electrical engineering. Electronics Nuclear engineering
54
Internet of things
35
Security
23
Blockchain
22
Deep learning
20
Security systems
20
security
20
Authentication
19
article
19
Convolutional neural networks
18
Cybersecurity
18
Block-chain
17
QA76 Computer software
17
deep learning
17
Artificial intelligence
16
Computer networking & communications
16
Cryptography
15
machine learning
15
Convolution
14
Cyber security
14
Digital storage
14
Electric power transmission networks
14
human
14
Machine learning
13
Cloud computing
12
Computer security
12
Convolutional neural network
12
Information management
11
-
121by Moore, Patrick“... for the provision of network security are presented. The first of these is a novel ASIP based interface, which...”
Published 2009
Get full text
-
122
-
123by León Abarca, Olga“... of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves...”
Published 2012
Get full text
Others -
124
-
125by Becker, SheilaSubjects: “...[INFO:INFO_NI] Computer Science/Networking and Internet Architecture...”
Published 2012
Get full text
Get full text
-
126by Schively, Jody L.“... firewall, obtained from Texas A&M, that can be installed and used to improve the network security between...”
Published 2013
Get full text
-
127
-
128“...In this thesis it isshown how to measure the annual loss expectancy of computer networks due...”
Get full text
Others -
129“...Approved for public release; distribution is unlimited === For computer network infiltration...”
Get full text
-
130
-
131“...-firewall, and real-time traffic analysis to build a network security management library, NSML, which can...”
Get full text
Others -
132“... the authentication mechanism with the IMS network. Moreover, for secure IMS service access, the MS should perform...”
Get full text
Others -
133“...碩士 === 中國文化大學 === 資訊管理研究所 === 90 === Firewall is a important security system in network security...”
Get full text
Others -
134“... in the global mobility network (GLOMONET); and (5) developing secure E-mail protocols for mobile devices...”
Get full text
Others -
135“... that later have to be evaluated securely. Second, we ask to what extent the functionality for evaluating...”
Get full text
Article -
136“.... These applications require a large number of Internet network resources, good bandwidth management and security...”
Get full text
Others -
137“... the network usage. That makes people to concern seriously about the network security. It is well known...”
Get full text
Others -
138“... devices can be connected into a network, called home network. Family members can request services from...”
Get full text
Others -
139by Gudapati, Supriya“... especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a...”
Published 2015
Get full text
-
140“... to design an integrated network-security architecture so as to make information safer, proactively...”
Get full text
Others