Suggested Topics within your search.
Suggested Topics within your search.
Network security
82
QA75 Electronic computers. Computer science
79
TK Electrical engineering. Electronics Nuclear engineering
54
Internet of things
35
Security
23
Blockchain
22
Deep learning
20
Security systems
20
security
20
Authentication
19
article
19
Convolutional neural networks
18
Cybersecurity
18
Block-chain
17
QA76 Computer software
17
deep learning
17
Artificial intelligence
16
Computer networking & communications
16
Cryptography
15
machine learning
15
Convolution
14
Cyber security
14
Digital storage
14
Electric power transmission networks
14
human
14
Machine learning
13
Cloud computing
12
Computer security
12
Convolutional neural network
12
Information management
11
-
141“.... In order to improve security degree of a network, we should analyze all kinds of network threats...”
Get full text
Others -
142“... rate technique, new response mechanism, an active network based security system - Active Network...”
Get full text
Others -
143by 劉宸瑋“...碩士 === 國立交通大學 === 資訊科學與工程研究所 === 94 === Security protocol domain is more and more important...”
Published 2006
Get full text
Others -
144“... that, network attacking is composite by multiple steps of attacks. The attacker should consider and combine...”
Get full text
Others -
145
-
146
-
147“... to analyze vulnerability information. Besides, we also developed a methodology to evaluate network security...”
Get full text
Others -
148“..., threats also increase. More and more foundations, companies and tools of computer network security emerge...”
Get full text
Others -
149“... or higher security strength. Finally, in mobile networks, we focus on the popular terminals, android based...”
Get full text
Others -
150
-
151
-
152
-
153by Wu, Yucheng“... invitations. Beside these security solutions, a real mobile social network has been implemented, using...”
Published 2012
Get full text
Others -
154by Cheng, L. L. L.“... presents a novel hop-by-hop active network security management approach known as Security Protocol...”
Published 2007
Get full text
-
155by Harbin, James R.“...This thesis explores security issues in wireless sensor networks (WSNs), and network-layer...”
Published 2011
Get full text
-
156by Lauinger, Tobias“... by Content-Centric Networking from a security perspective. One security-critical feature of Content-Centric...”
Published 2010
Get full text
Get full text
Dissertation -
157by EVALDO GONCALVES PELAESSubjects: “...[en] NETWORKS COMPUTER...”
Published 2008
Get full text
Get full text
Get full text
-
158by Adebiyi, Adetunji B.“... that identify the security flaws in the design scenarios. Also, with the proposed neural network tool...”
Published 2013
Get full text
-
159by Panaousis, Emmanouil A.“... by establishing a multihop radio network and maintain connectivity in an infrastructureless manner. Security...”
Published 2012
Get full text
-
160Published 2012Subjects: “...Computer networks--Mathematical models...”
Get full text
Get full text
Others