Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7
Научные статьи
В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Study and Analysis of Text Steganography Tools
Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Textual Manipulation for SQL Injection Attacks
Scheduling in Grid Systems using Ant Colony Algorithm
Minimization of Power Consumption in Mobile Adhoc Networks
Audio Codecs in VoIPv6: A Performance Analysis
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
A Generic Middleware Model for Smart Home
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
Analysis of Host-Based and Network-Based Intrusion Detection System
A New Classification Scheme for Intrusion Detection Systems
C2DF: High Rate DDOS filtering method in Cloud Computing
SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks
Trust Metric based Soft Security in Mobile Pervasive Environment
VoIP Performance Analysis over IPv4 and IPv6
OpenFlow Technology: A Journey of Simulation Tools
A Comprehensive Analysis of Android Security and Proposed Solutions
Controlling Information Flows in Net Services with Low Runtime Overhead
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Secure Usable Authentication Using Strong Pass text Passwords
Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
DNS Pharming through PHP Injection: Attack Scenario and Investigation
Embedded Real-Time HTTP Server
Single Sign-On in Cloud Federation using CloudSim
Information Hiding Using Least Significant Bit Steganography and Cryptography
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks
Secure Allocation of Resources in Cloud Using Trust
Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission
A Note on Group Authentication Schemes
Analyzing Multiple Routing Configuration
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique
Comparative Analysis of Classification Algorithms on KDD'99 Data Set
An Improved Kerberos Scheme Based on Dynamic Password
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
A Hybrid P2P Approach to Service Discovery in the Cloud
← Предыдущая
Следующая страница →
1
|
...
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.