Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks
Vulnerabilities in Academic E-governance Portals
Formal Verification of Congestion Control Algorithm in VANETs
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Criteria Specifications for the Comparison and Evaluation of Access Control Models
A Bespoke Technique for Secret Messaging
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
Recent Replica Placement Algorithms in P2P Networks – A Review
Social Networking for Botnet Command and Control
Enhancing the Discrete Particle Swarm Optimization based Workflow Grid Scheduling using Hierarchical Structure
Password Hardened Biometric: A Complete Solution of Online Security
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
A New Proposal for Route Finding in Mobile AdHoc Networks
Wi-Fi Networks Security and Accessing Control
A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks
Image Encryption based on the RGB PIXEL Transposition and Shuffling
Analysis of the SYN Flood DoS Attack
Information Leakage Prevention Using Virtual Disk Drive
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer
Establishing Inter Vehicle Wireless Communication in Vanet and Preventing It from Hackers
Performance Analysis of AODV, CBRP, DSDV and DSR MANET Routing Protocol using NS2 Simulation
Dynamic Model on the Transmission of Malicious Codes in Network
Performance Improvement of Cache Management In Cluster Based MANET
KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69
Biometric based Security Solutions for MANET: A Review
Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services
A New Model for Intrusion Detection based on Reduced Error Pruning Technique
A New Distributed and Power-Efficient Topology Control Algorithm for Wireless Ad-Hoc Networks
Fuzzy Membership Function in a Trust Based AODV for MANET
Performance Evaluation of AODV under Blackhole Attack
Study and Analysis of Text Steganography Tools
A New QUERY-REPLY Driven Routing Protocol with Reachability Analysis for Mobile Networks: DAG based Approach
Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Textual Manipulation for SQL Injection Attacks
Auto-Pattern Programmable Kernel Filter (Auto-PPKF) for Suppression of Bot Generated Traffic
A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)
Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model
AWireless Local Area Network Soft Cell Phone (SCP) System with Multimedia and Data Services
Enhanced Role Based Access Control Mechanism for Electronic Examination System
← Предыдущая
Следующая страница →
1
|
...
|
24
|
25
|
26
|
27
|
28
|
29
|
30
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.