-
1
-
2
-
3
-
4by Kabir-Querrec, MaëlleSubjects: “...Network intrusion detection - NIDS...”
Published 2017
Get full text
-
5
-
6
-
7
-
8
-
9by Soury, Ayoub“... duplicates the initial cycle time of the network, which nonetheless satisfies the security and time...”
Published 2018
Get full text
-
10by Bui, Duy-Hieu“... the Internet, and sensor nodes which can collect data, send them through the network infrastructure...”
Published 2019
Get full text
-
11by Sicard, Franck“... industrial devices connected to a network and used to control a physical system. They control electrical...”
Published 2018
Get full text
-
12by Kassem, Ali“..., especially when an open network such as the Internet is used.To ensure security in such applications...”
Published 2015
Get full text
-
13by Niembro Martin, Alejandro“... of products capable to control the range of the network has appeared, for data security reasons, for data rate...”
Published 2015
Get full text
-
14by Dos Santos, Jessye“... will extend the privacy notion to the objects. To do this, we will show that in wireless sensor networks where...”
Published 2017
Get full text
-
15by Hajar, Khaled“... networks will allow to answer efficiently the problems related to:- Security of supply- Massive integration...”
Published 2017
Get full text
-
16by Desjouis, Boris“..., economic, reliable and secure. It was made possible by the implementation of considerable resources...”
Published 2016
Get full text
-
17by Nguyen, Tung Lam“..., and security. The multi-agent system is an advanced technique having properties that make them suitable...”
Published 2019
Get full text
-
18by Dobrowolski, Jean“... national grid with specific objectives such as energy security, lower greenhouse gas emissions and so...”
Published 2017
Get full text
-
19by Nguyen, Ngoc-Mai“... in various applications ranging for video conferencing, security and monitoring systems, but also...”
Published 2015
Get full text
-
20by Bouayadi, Ossama El“... of telecommunications, multimedia entertainment, automotive and security. More specifically, telecommunications...”
Published 2015
Get full text