Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Component importance measures based risk and reliability analysis of Vehicular Ad Hoc Networks
Hybrid KP-ABE algorithm with time bounded access control for cloud data security
QoS oriented cross-synch routing protocol for event driven, mission-critical communication over MANET: Q-CSRPM
Novel secured biometric system procuring miniaturized prorogation
Cuckoo optimisation based intrusion detection system for cloud computing
An integrated perceptron kernel classifier for intrusion detection system
Identification of compromised nodes in MANETs using machine learning technique
Understanding the evolution of ransomware: paradigm shifts in attack structures
A critical appraisal on password based authentication
Cyber security and analysis of cyber-crime laws to restrict cyber crime in Pakistan
PSO and TLBO based reliable placement of controllers in SDN
Deep learning approach on network intrusion detection system using NSL-KDD dataset
Network intrusion detection system based PSO-SVM for cloud computing
Conceptual model of national intellectucal system for children safety in internet environment
IoT: application protocols and security
On the impact of perceived vulnerability in the adoption of information systems security innovations
A feed-forward and pattern recognition ANN model for network intrusion detection
A novel scheme for isolation of distributed denial of service attack in VANETs
A DOS and network probe attack detection based on HMM using fuzzy inference
Intrusion detection using machine learning and feature selection
Construction for searchable encryption with strong security guarantees
IAMIN: An infrastructure-aware middleware for the reconfiguration of unstructured Peer-to-Peer overlay networks
Distributed wormhole attack mitigation technique in WSNs
A new classification based model for malicious PE files detection
Blind payment protocol for payment channel networks
A privacy-aware dynamic authentication scheme for IoT enabled business services
Secure data transmission of video steganography using Arnold scrambling and DWT
Open source intelligence testing using the OWASP version 4 framework at the information gathering stage (Case Study: X Company)
An improved DNA based security model using reduced cipher text technique
Agent based trust establishment between vehicle in vehicular cloud networks
Data mining based framework for effective intrusion detection using hybrid feature selection approach
Parameter training in MANET using artificial neural network
An improved method for packed malware detection using PE header and section table information
An approach to develop a transactional calculus for semi-structured database system
A classification framework to detect DoS attacks
An efficiency optimization for network intrusion detection system
Security policy modelling in the mobile agent system
Network architectures, challenges, security attacks, research domains and research methodologies in VANET: a survey
An TPM based approach for generation of secret key
A combined approach for effective features extraction from online product reviews
← Предыдущая
Следующая страница →
1
|
...
|
55
|
56
|
57
|
58
|
59
|
60
|
61
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.