Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment
Congestion Control in 4G Wireless Networks Using Coalition Game
An Analytical Assessment on Document Clustering
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Toward Security Test Automation for Event Driven GUI Web Contents
Security Aspects and Challenges in Mobile Adhoc Networks
Deliberate Secure Grid Computing Blueprint Design in Indian Context
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Distributed Encrypting File System for Linux in User-space
Mining Data Streams using Option Trees
Routers Sequential Comparing Two Sample Packets for Dropping Worms
Self Organized Replica Overlay Scheme for P2P Networks
Securing Zone Routing Protocol in Ad-Hoc Networks
Constraint Based Periodicity Mining in Time Series Databases
Impact of Model Mobility in Ad Hoc Routing Protocols
A Survey: Recent Advances and Future Trends in Honeypot Research
An Effective and Secure Cipher Based on SDDO
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework
Using Adaptive Neuro-Fuzzy Inference System in Alert Management of Intrusion Detection Systems
A New 512 Bit Cipher for Secure Communication
Feature Based Audio Steganalysis (FAS)
Software Activation Using Multithreading
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations
Risk Management Strategies for the Use of Cloud Computing
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN
Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm
A Framework for Real-Time Resource Allocation in IP Multimedia Subsystem Network
← Предыдущая
Следующая страница →
1
|
...
|
23
|
24
|
25
|
26
|
27
|
28
|
29
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.