Showing 121 - 140 results of 31,117 for search 'NETWORK SECURITY', query time: 0.88s Refine Results
  1. 121
    by Moore, Patrick
    Published 2009
    ... for the provision of network security are presented. The first of these is a novel ASIP based interface, which...
    Get full text
  2. 122
  3. 123
    by León Abarca, Olga
    Published 2012
    ... of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves...
    Get full text
    Others
  4. 124
  5. 125
    by Becker, Sheila
    Published 2012
    Subjects: ...[INFO:INFO_NI] Computer Science/Networking and Internet Architecture...
    Get full text
    Get full text
  6. 126
    by Schively, Jody L.
    Published 2013
    ... firewall, obtained from Texas A&M, that can be installed and used to improve the network security between...
    Get full text
  7. 127
    by Brown, Ian
    Published 2001
    Subjects: ...Networks...
    Get full text
  8. 128
    by Ali, Dana, Kap, Goran
    Published 2013
    ...In this thesis it isshown how to measure the annual loss expectancy of computer networks due...
    Get full text
    Others
  9. 129
    by Salevski, Paul M., Taff, William R.
    Published 2012
    ...Approved for public release; distribution is unlimited === For computer network infiltration...
    Get full text
  10. 130
  11. 131
    by Tzong-Yiing Tsai, 蔡宗穎
    Published 2007
    ...-firewall, and real-time traffic analysis to build a network security management library, NSML, which can...
    Get full text
    Others
  12. 132
    by Hsu, Shih-Feng, 許世芬
    Published 2009
    ... the authentication mechanism with the IMS network. Moreover, for secure IMS service access, the MS should perform...
    Get full text
    Others
  13. 133
    by Tien-Yuan Jeng, 鄭添源
    Published 2002
    ...碩士 === 中國文化大學 === 資訊管理研究所 === 90 ===   Firewall is a important security system in network security...
    Get full text
    Others
  14. 134
    by Lee, Chia-Yin, 李佳穎
    Published 2010
    ... in the global mobility network (GLOMONET); and (5) developing secure E-mail protocols for mobile devices...
    Get full text
    Others
  15. 135
    by Dalskov Anders, Escudero Daniel, Keller Marcel
    Published 2020-10-01
    ... that later have to be evaluated securely. Second, we ask to what extent the functionality for evaluating...
    Get full text
    Article
  16. 136
    by Yeh, Yen-Te, 葉彥德
    Published 2014
    .... These applications require a large number of Internet network resources, good bandwidth management and security...
    Get full text
    Others
  17. 137
    by Chi-Hsiang Hung, 洪吉祥
    Published 2013
    ... the network usage. That makes people to concern seriously about the network security. It is well known...
    Get full text
    Others
  18. 138
    by Shih-Yen Chien, 簡實言
    Published 2010
    ... devices can be connected into a network, called home network. Family members can request services from...
    Get full text
    Others
  19. 139
    by Gudapati, Supriya
    Published 2015
    ... especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a...
    Get full text
  20. 140
    by Yu-kuo Tseng, 曾昱國
    Published 2004
    ... to design an integrated network-security architecture so as to make information safer, proactively...
    Get full text
    Others