Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
Object Authentication Using RFID Technology: A Multi-tag Approach
Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations
Fast and Efficient Design of a PCA-Based Hash Function
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks
QoS Comparison of MANET Routing Protocols
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
A Mathematical Model on Selfishness and Malicious Behavior in Trust based Cooperative Wireless Networks
Can universally composable cryptographic protocols be practical?
CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU
A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia
Data Traffic Modeling During Global Cyberattacks
An Innovative Approach for Video Steganography
Extended K-Anonymity Model for Privacy Preserving on Micro Data
Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System
Real-Time Encryption/Decryption of Audio Signal
Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles
Multicast Due Date Round-Robin Scheduling Algorithm for Input-Queued Switches
Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Optimized Communication of Group Mobility in WPAN
An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network
Addressing Packet Forwarding Misbehavior with Two Phase Security Scheme for AODV-based MANETs
A System Call Randomization Based Method for Countering Code-Injection Attacks
Stochastic RA-Network for the Nodes Functioning Analysis in the Distributed Computer Systems
An Improved Hybrid Mechanism for Secure Data Communication
DNA-Genetic Encryption Technique
Improving the Performance of Routing Protocol using Genetic Algorithm
An Efficient Position based Power Aware Routing Algorithm in Mobile Ad-hoc Networks
An Improved Active Shape Model Application onFacial Feature Localization
Modelling and Implementation of Network Coding for Video
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing
Contextual Risk-based Decision Modeling for Vehicular Networks
A Genetic Programming Framework for Topic Discovery from Online Digital Library
Efficient Resource Management for Multicast Ad Hoc Networks: Survey
Detection and Mitigation of Sybil Attack in Peer-to-peer Network
A Proxy based Framework for Efficient Range Query Processing in a Cellular Network
Low Level Performance Evaluation of InfiniBand with Benchmarking Tools
← Предыдущая
Следующая страница →
1
|
...
|
28
|
29
|
30
|
31
|
32
|
33
|
34
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.