Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Investigating and analyzing bitcoin blockchain protocol using wireshark
A state-of-the-art survey of coverless text information hiding
Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator
Through the diversity of bandwidth-related metrics, estimation techniques and tools: an overview
Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization
Parallel prefix sum algorithm on optoelectronic biswapped network hyper hexa-cell
Development and implementation of vehicle movement notification and location using GSM, GPS and web based information system
A multi QoS genetic-based adaptive routing in wireless mesh networks with pareto solutions
Using progressive success probabilities for sound-pruned enumerations in BKZ algorithm
An efficient indexing technique for AES lookup table to prevent side-channel cache timing attack
Role of scripting language on Unix operating system for risk assessment
Verification of web content integrity: detection and recovery security approach using colored petri nets
Reliability evaluation and analysis of interconnection network using edge-disjoint minimal path method
Evaluation of different routing protocols for mobile ad-hoc networks in scenarios with high-speed mobility
Block chain: cryptographic method in fourth industrial revolution
QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM
Novel secured biometric system procuring miniaturized prorogation
Cuckoo optimisation based intrusion detection system for cloud computing
Acknowledgement based localization method (ALM) to improve the positioning in vehicular ad hoc networks
An email modelling approach for neural network spam filtering to improve score-based anti-spam systems
An integrated perceptron kernel classifier for intrusion detection system
Security risk analysis and management in mobile wallet transaction: a case study of pagatech nigeria limited
A novel infrared (IR) based sensor system for human presence detection in targeted locations
performance analysis of underwater acoustic communication using IDMA-OFDM-MIMO with reed Solomon and turbo code
Underwater sensor networks: an efficient node deployment technique for enhancing coverage and connectivity: END-ECC
A comparative study of recent steganography techniques for multiple image formats
Understanding the evolution of ransomware: paradigm shifts in attack structures
Analyzing progressive-BKZ lattice reduction algorithm
A chaotic cryptosystem using conjugate transcendental fractal function
Performance analysis of convolution code with variable constraint length in shallow underwater acoustic communication
An efficient steganography technique for images using chaotic bitstream
An efficient image block encryption for key generation using non-uniform cellular automata
Inculcating global optimization in ZRP through newfangled firefly algorithm
Deep learning approach on network intrusion detection system using NSL-KDD dataset
Comprehensive study of data aggregation models, challenges and security issues in wireless sensor networks
IoT: application protocols and security
A feed-forward and pattern recognition ANN model for network intrusion detection
A novel scheme for isolation of distributed denial of service attack in VANETs
Construction for searchable encryption with strong security guarantees
IAMIN: An infrastructure-aware middleware for the reconfiguration of unstructured Peer-to-Peer overlay networks
← Предыдущая
Следующая страница →
1
|
...
|
94
|
95
|
96
|
97
|
98
|
99
|
100
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.