Suggested Topics within your search.
Suggested Topics within your search.
Network security
99
QA75 Electronic computers. Computer science
79
Technology: general issues
64
History of engineering and technology
57
TK Electrical engineering. Electronics Nuclear engineering
54
Artificial intelligence
45
Computer networking and communications
39
Computer security
37
Internet of things
35
Research & information: general
33
Software Engineering
28
Computer science
23
Security
23
Blockchain
22
History of engineering & technology
22
Computer networking & communications
20
Deep learning
20
Security systems
20
security
20
Authentication
19
Information technology industries
19
article
19
Convolutional neural networks
18
Cybersecurity
18
Network hardware
18
Block-chain
17
Machine learning
17
QA76 Computer software
17
deep learning
17
Cryptography
15
-
21
-
22“... Network security incidents frequently occur along with the rapid evolution of new cyber crimes. Breaches...”
Get full text
Others -
23by Gopalakrishnan, AravindSubjects: “...multi-domain network performance monitoring...”
Published 2012
Get full text
-
24by Dikaliotis, Theodoros K.“...<p>In this thesis, delay and security issues in network coding are considered. First, we study...”
Published 2013
Get full text
Get full text
Others -
25
-
26“...The article presents the concept of building a network security model and its application...”
Get full text
Article -
27
-
28
-
29
-
30
-
31
-
32by Alexandr Diomidovich Afanasyev, Alexei Anatolyevich Tikhomirov, Andrey Ivanovich TrufanovSubjects: “...information security...”
Published 2016-03-01
Get full text
Article -
33by Bulusu, Vijay“... to their inherent broadcast nature Security and Privacy in wireless networks is harder than the wired networks...”
Published 2006
Get full text
Others -
34
-
35by Jonsson, Kristjan Valur“...In-network aggregation is an important paradigm for current and future networked systems, enabling...”
Published 2013
Get full text
Get full text
Doctoral Thesis -
36
-
37
-
38by Burchett, IanSubjects: “...network security data...”
Published 2011
Get full text
Get full text
Others -
39
-
40