Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
A Hybrid Artificial Bee Colony and Harmony Search Algorithm to Generate Covering Arrays for Pair-wise Testing
Optimization of Parameters at SDN Technologie Networks
Discussion on Damping Factor Value in PageRank Computation
A Fair-Priority MAC design in Networked Control System
Using P systems to Solve the Discrete Logarithm Problem used in Diffie-Hellman Key Exchange Protocol
System Design of a Trusted SoC and Detailed Analysis of its Secure State Transitions
Code Formal Verification of Operation System
A new Immunity Intrusion Detection Model Based on Genetic Algorithm and Vaccine Mechanism
An Improved Dynamic Probabilistic Packet Marking for IP Traceback
A Semantic Context-Based Model for MobileWeb Services Access Control
A Method of Hash Join in the DAS Model
A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network
Transaction-based QoS management in a Hybrid Wireless Superstore Environment
A New Secure Strategy in Small-Scale IEEE 802.11 Wireless Local Area Networks with Web Authentication and Virtual Local Area Network
Securing the Distributions in P2P Networks with Trusted Platform Modules
A Secure Method for Network Coding-based Reprogramming Protocols in Wireless Sensor Networks
Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage
A Novel Framework to Carry Out Cloud Penetration Test
An Algebraic Method for the N-Queens Problem Based on Permutation Operation Group
Design and Implementation for Malicious Links Detection System Based On Security Relevance of Webpage Script Text
Layered Design and Collaborative Development of Network System and Its Application in Real-time Information Cluster
Research of Emergency Vehicles Information System Based on SOA
M2KMIX: Identifying the Type of High Rate Flooding Attacks using a Mixture of Expert Systems
CSRF Vulnerabilities and Defensive Techniques
Improved Classification Methods for Brain Computer Interface System
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
A Novel Security Scheme for Secret Data using Cryptography and Steganography
Semifragile Watermarking Schemes for Image Authentication- A Survey
Distributed Algorithms for Improving Search Efficiency in P2P Overlays
Network Packet Inspection to Identify Contraband File Sharing Using Forensic Tools
Investigations of Cellular Automata Linear Rules for Edge Detection
Very Large Scale Optical Interconnect Systems For Different Types of Optical Interconnection Networks
Evaluation of IP Multimedia Subsystem based Mobile Mass Examination System
A Packet Routing Model for Computer Networks
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks
Digital Forensic Investigation Tools and Procedures
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
A Hierarchical Load Balancing Policy for Grid Computing Environment
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
← Предыдущая
Следующая страница →
1
|
...
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.