Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7
Научные статьи
В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
MMeMeR: An Algorithm for Clustering Heterogeneous Data using Rough Set Theory
A Hybrid Artificial Bee Colony and Harmony Search Algorithm to Generate Covering Arrays for Pair-wise Testing
Tree-Based Matched RFID Yoking Making It More Practical and Efficient
A WMPLS Based Multicast Mechanism in Mobile Ad hoc Network
A New Secure Strategy in Small-Scale IEEE 802.11 Wireless Local Area Networks with Web Authentication and Virtual Local Area Network
Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage
A Novel Framework to Carry Out Cloud Penetration Test
CSRF Vulnerabilities and Defensive Techniques
Improved Classification Methods for Brain Computer Interface System
Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms
Semifragile Watermarking Schemes for Image Authentication- A Survey
Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System
Distributed Algorithms for Improving Search Efficiency in P2P Overlays
A Packet Routing Model for Computer Networks
Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
Evaluating Overheads of Integrated Multilevel Checkpointing Algorithms in Cloud Computing Environment
Security Aspects and Challenges in Mobile Adhoc Networks
Deliberate Secure Grid Computing Blueprint Design in Indian Context
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
A Procedure of Text Steganography Using Indian Regional Language
Self Organized Replica Overlay Scheme for P2P Networks
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques
Risk Management Strategies for the Use of Cloud Computing
Blocking of SQL Injection Attacks by Comparing Static and Dynamic Queries
Integrated Safety Mechanisms Based on Security Risks Minimization for the Distributed Computer Systems
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP
A Full-text Website Search Engine Powered by Lucene and The Depth First Search Algorithm
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
Recent Replica Placement Algorithms in P2P Networks – A Review
Effect of Black Hole Attack on MANET Routing Protocols
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
Wi-Fi Networks Security and Accessing Control
A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks
Analysis of the SYN Flood DoS Attack
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer
← Предыдущая
Следующая страница →
1
|
...
|
7
|
8
|
9
|
10
|
11
|
12
|
13
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.