Showing 141 - 160 results of 31,117 for search 'NETWORK SECURITY', query time: 1.06s Refine Results
  1. 141
    by Chiin-Wei Su, 蘇俊維
    Published 2003
    .... In order to improve security degree of a network, we should analyze all kinds of network threats...
    Get full text
    Others
  2. 142
    by Wen-ping Lee, 李文平
    Published 2004
    ... rate technique, new response mechanism, an active network based security system - Active Network...
    Get full text
    Others
  3. 143
    by 劉宸瑋
    Published 2006
    ...碩士 === 國立交通大學 === 資訊科學與工程研究所 === 94 === Security protocol domain is more and more important...
    Get full text
    Others
  4. 144
    by Yu-shu Chien, 簡育書
    Published 2008
    ... that, network attacking is composite by multiple steps of attacks. The attacker should consider and combine...
    Get full text
    Others
  5. 145
  6. 146
  7. 147
    by Lin, Biing-Jong, 林秉忠
    Published 1999
    ... to analyze vulnerability information. Besides, we also developed a methodology to evaluate network security...
    Get full text
    Others
  8. 148
    by Jia-Ching Fang, 方家慶
    Published 2003
    ..., threats also increase. More and more foundations, companies and tools of computer network security emerge...
    Get full text
    Others
  9. 149
    by Wen-bin Hsieh, 謝文彬
    Published 2013
    ... or higher security strength. Finally, in mobile networks, we focus on the popular terminals, android based...
    Get full text
    Others
  10. 150
    by Nawaz, Omer
    Published 2011
    Subjects: ...Secure Identification...
    Get full text
    Others
  11. 151
  12. 152
  13. 153
    by Wu, Yucheng
    Published 2012
    ... invitations. Beside these security solutions, a real mobile social network has been implemented, using...
    Get full text
    Others
  14. 154
    by Cheng, L. L. L.
    Published 2007
    ... presents a novel hop-by-hop active network security management approach known as Security Protocol...
    Get full text
  15. 155
    by Harbin, James R.
    Published 2011
    ...This thesis explores security issues in wireless sensor networks (WSNs), and network-layer...
    Get full text
  16. 156
    by Lauinger, Tobias
    Published 2010
    ... by Content-Centric Networking from a security perspective. One security-critical feature of Content-Centric...
    Get full text
    Get full text
    Dissertation
  17. 157
  18. 158
    by Adebiyi, Adetunji B.
    Published 2013
    ... that identify the security flaws in the design scenarios. Also, with the proposed neural network tool...
    Get full text
  19. 159
    by Panaousis, Emmanouil A.
    Published 2012
    ... by establishing a multihop radio network and maintain connectivity in an infrastructureless manner. Security...
    Get full text
  20. 160
    Published 2012
    Subjects: ...Computer networks--Mathematical models...
    Get full text
    Get full text
    Others