Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Fault Tolerant Message Efficient Coordinator Election Algorithm in High Traffic Bidirectional Ring Network
Improved Anti-Collision Algorithm for Tag Identification in Future Internet of Things
A Survey of Applications and Security Issues in Software Defined Networking
Design and Implementation of Secure Building Monitoring System using Programmable Wireless Mobile Camera
Distributed Defense: An Edge over Centralized Defense against DDos Attacks
Self-organized Detection of Relationships in a Network
Evaluation of Secure Cloud Transmission Protocol
Anomaly Detection System in Secure Cloud Computing Environment
A Mobile-Based Computer Controller via Android Technology
New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher
Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies
A Survey on Graph Queries Processing: Techniques and Methods
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce
Internet of Things: A Review on Technologies, Architecture, Challenges, Applications, Future Trends
SCXTREME Framework: A Customized Approach of Process Improvements in Agile Blend with CMMI Practices in Pakistan
Enhancing Software Reliability against Soft-Error using Minimum Redundancy on Critical Data
PEECA: PSO-Based Energy Efficient Clustering Algorithm for Wireless Sensor Networks
A Method for Verifiable Secret Image Sharing
Homomorphic Cryptosystem
Cost-Aware Task Scheduling in Cloud Computing Environment
On a Novel Grid Computing-Based Distributed Brute-force Attack Scheme (GCDBF) By Exploiting Botnets
Method for Cyberincidents Network-Centric Monitoring in Critical Information Infrastructure
A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing
Analysis of QoS in Software Defined Wireless Network with Spanning Tree Protocol
Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors
Trust Establishment in SDN: Controller and Applications
Detection of Wormhole, Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology
K-MLP Based Classifier for Discernment of Gratuitous Mails using N-Gram Filtration
Heuristic Algorithms for Task Scheduling in Cloud Computing: A Survey
A Partial Ordered Number System for Information Flow Control
Evaluation of Hidden Semi-Markov Models Training Methods for Greek Emotional Text-to-Speech Synthesis
Location Privacy using Homomorphic Encryption over Cloud
Handover Comparisons of WiMAX and WiMAX Release 2
Distributed Malware Detection Algorithm (DMDA)
Performance Evaluation of Index Schemes for Semantic Cache
A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security
Performance Evaluation of I.T Project Management in Developing Countries
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment
Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES
Platform-Independent Courseware Sharing
← Предыдущая
Следующая страница →
1
|
...
|
30
|
31
|
32
|
33
|
34
|
35
|
36
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.