Suggested Topics within your search.
Suggested Topics within your search.
Network security
99
QA75 Electronic computers. Computer science
79
Technology: general issues
64
History of engineering and technology
57
TK Electrical engineering. Electronics Nuclear engineering
54
Artificial intelligence
45
Computer networking and communications
39
Computer security
37
Internet of things
35
Research & information: general
33
Software Engineering
28
Computer science
23
Security
23
Blockchain
22
History of engineering & technology
22
Computer networking & communications
20
Deep learning
20
Security systems
20
security
20
Authentication
19
Information technology industries
19
article
19
Convolutional neural networks
18
Cybersecurity
18
Network hardware
18
Block-chain
17
Machine learning
17
QA76 Computer software
17
deep learning
17
Cryptography
15
-
121
-
122
-
123by Moore, Patrick“... for the provision of network security are presented. The first of these is a novel ASIP based interface, which...”
Published 2009
Get full text
-
124
-
125by León Abarca, Olga“... of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves...”
Published 2012
Get full text
Others -
126
-
127by Becker, SheilaSubjects: “...[INFO:INFO_NI] Computer Science/Networking and Internet Architecture...”
Published 2012
Get full text
Get full text
-
128by Schively, Jody L.“... firewall, obtained from Texas A&M, that can be installed and used to improve the network security between...”
Published 2013
Get full text
-
129
-
130“...In this thesis it isshown how to measure the annual loss expectancy of computer networks due...”
Get full text
Others -
131“...Approved for public release; distribution is unlimited === For computer network infiltration...”
Get full text
-
132
-
133“...-firewall, and real-time traffic analysis to build a network security management library, NSML, which can...”
Get full text
Others -
134“... the authentication mechanism with the IMS network. Moreover, for secure IMS service access, the MS should perform...”
Get full text
Others -
135“...碩士 === 中國文化大學 === 資訊管理研究所 === 90 === Firewall is a important security system in network security...”
Get full text
Others -
136“... in the global mobility network (GLOMONET); and (5) developing secure E-mail protocols for mobile devices...”
Get full text
Others -
137“... that later have to be evaluated securely. Second, we ask to what extent the functionality for evaluating...”
Get full text
Article -
138“.... These applications require a large number of Internet network resources, good bandwidth management and security...”
Get full text
Others -
139“... the network usage. That makes people to concern seriously about the network security. It is well known...”
Get full text
Others -
140“... devices can be connected into a network, called home network. Family members can request services from...”
Get full text
Others