Works matching Computer network security
1
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 5, p. 3979, doi. 10.12694/scpe.v25i5.3150
- CHONGFENG TIAN;
- ZHIHAO CHEN;
- YI ZHU;
- HONGFEI LU;
- GUOXIAO LI;
- RONGQUAN LI;
- WEI PAN
- Article
2
- Computer Applications in Engineering Education, 2017, v. 25, n. 2, p. 290, doi. 10.1002/cae.21797
- Stojanov, Zeljko;
- Dobrilovic, Dalibor;
- Zorić, Tamara
- Article
3
- Journal of Applied Quantitative Methods, 2010, v. 5, n. 4, p. 571
- MARSANU, Nicolae Radu;
- SICHITIU, Claudiu;
- SICHITIU, George
- Article
4
- Electronics (2079-9292), 2024, v. 13, n. 22, p. 4556, doi. 10.3390/electronics13224556
- Liu, Zhiwei;
- Li, Xiaoyu;
- Mu, Dejun
- Article
5
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7472205
- Article
6
- Scalable Computing: Practice & Experience, 2021, v. 22, n. 2, p. 161, doi. 10.12694/scpe.v22i2.1881
- ZHIFENG HU;
- FENG ZHAO;
- LINA QIN;
- HONGKAI LIN
- Article
7
- Journal of Electronic Imaging, 2023, v. 32, n. 1, p. 11214, doi. 10.1117/1.JEI.32.1.011214
- Wang, Zilong;
- Shi, Lin;
- Chen, Ning;
- Chen, Jie
- Article
8
- Journal of Cyber Security Technology, 2022, v. 6, n. 4, p. 201, doi. 10.1080/23742917.2022.2120293
- Li, Zhaocui;
- Liu, Huichuan;
- Wu, Chunyan
- Article
9
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/3170164
- Sun, Yu;
- Liu, Xiaorong;
- Shen, Xiaoli
- Article
10
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/6485195
- Article
11
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1789222
- Article
12
- International Journal of Advanced Research in Computer Science, 2016, v. 7, n. 6, p. 85
- Kumar, Mukesh;
- Kaur, Navpreet;
- Kaur, Sukhjinder;
- Singh, Rajpal
- Article
13
- Journal of Sensors, 2021, p. 1, doi. 10.1155/2021/5558860
- Wang, Yajing;
- Ma, Juan;
- Sharma, Ashutosh;
- Singh, Pradeep Kumar;
- Gaba, Gurjot Singh;
- Masud, Mehedi;
- Baz, Mohammed
- Article
14
- Journal of Digital Forensics, Security & Law, 2012, v. 7, n. 4, p. 51
- Article
15
- Advances in Multimedia, 2022, p. 1, doi. 10.1155/2022/6039690
- Article
16
- 2023
- and Communication Networks, Security
- Correction Notice
17
- 2023
- and Communication Networks, Security
- Correction Notice
18
- 2023
- and Communication Networks, Security
- Correction Notice
19
- 2023
- and Communication Networks, Security
- Correction Notice
20
- International Journal of Safety & Security Engineering, 2023, v. 13, n. 6, p. 1039, doi. 10.18280/ijsse.130606
- Lampezhev, Abas;
- Kuklin, Vladimir;
- Chervyakov, Leonid;
- Tatarkanov, Aslan
- Article
21
- Journal of Military & Strategic Studies, 2012, v. 14, n. 2, p. 1
- Article
22
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 16, p. 7871, doi. 10.1007/s00500-022-06813-6
- Article
23
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 3, p. 134, doi. 10.18372/2225-5036.25.14457
- Article
24
- Security & Communication Networks, 2012, v. 5, n. 4, p. 404, doi. 10.1002/sec.324
- Zhang, Yanping;
- Xiao, Yang;
- Chen, Min;
- Zhang, Jingyuan;
- Deng, Hongmei
- Article
25
- Automation & Remote Control, 2008, v. 69, n. 9, p. 1603, doi. 10.1134/S0005117908090130
- Nesteruk, G.;
- Nesteruk, L.;
- Nesteruk, F.
- Article
26
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 365, doi. 10.54216/JCIM.150129
- Article
27
- Jurnal Indonesia Sosial Teknologi, 2024, v. 5, n. 10, p. 4364, doi. 10.59141/jist.v5i10.5321
- Yudhistira, Andika Davi;
- Harwahyu, Ruki
- Article
28
- Issues in Informing Science & Information Technology, 2005, v. 2, p. 159, doi. 10.28945/818
- Article
29
- Plastics Science & Technology / Suliao Ke-Ji, 2024, v. 52, n. 5, p. 134, doi. 10.15925/j.cnki.issn1005-3360.2024.05.030
- DUAN Jin-kai;
- YANG Li-run;
- LIU Ruo-xing
- Article
30
- Informatica (03505596), 2023, v. 47, n. 2, p. 295, doi. 10.31449/inf.v47i2.4933
- Article
31
- International Journal of Communication Systems, 2005, v. 18, n. 8, p. 763, doi. 10.1002/dac.729
- Hamdi, Mohamed;
- Boudriga, Noureddine
- Article
32
- International Journal of Information Security & Cybercrime, 2018, v. 7, n. 1, p. 45, doi. 10.19107/ijisc.2018.01.05
- Article
33
- Earth Science Informatics, 2024, v. 17, n. 4, p. 3673, doi. 10.1007/s12145-024-01369-5
- Article
34
- IET Networks (Wiley-Blackwell), 2023, v. 12, n. 6, p. 269, doi. 10.1049/ntw2.12091
- Wenhua, Zhang;
- Kamrul Hasan, Mohammad;
- Ismail, Ahmad Fadzil;
- Yanke, Zhang;
- Razzaque, Md Abdur;
- Islam, Shayla;
- Anil kumar, Budati
- Article
35
- Studii şi Cercetări de Calcul Economic şi Cibernetică Economică, 2011, v. 45, n. 1/2, p. 95
- Article
36
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 321, doi. 10.1049/iet-ifs.2018.5295
- Anitha Ruth, J.;
- Sirmathi, H.;
- Meenakshi, A.
- Article
37
- Neutrosophic Sets & Systems, 2025, v. 77, p. 479
- Lei Yang;
- Junyan Niu;
- Jiangfeng Li
- Article
38
- Neutrosophic Sets & Systems, 2025, v. 77, p. 375
- Ziqiao Wang;
- Xiaomu Cai;
- Zhefeng Yin
- Article
39
- Neutrosophic Sets & Systems, 2025, v. 76, p. 520
- Article
40
- Journal Scientific & Applied Research, 2013, v. 4, p. 74, doi. 10.46687/jsar.v4i1.83
- Article
41
- Journal of Research & Practice in Information Technology, 2014, v. 46, n. 4, p. 215
- Frye, Lisa;
- Liang Cheng;
- Heflin, Jeff
- Article
42
- IET Intelligent Transport Systems (Wiley-Blackwell), 2019, v. 13, n. 5, p. 780, doi. 10.1049/iet-its.2018.5117
- Arshad, Muhammad;
- Ullah, Zahid;
- Khalid, Muhammad;
- Ahmad, Naveed;
- Khalid, Waqar;
- Shahwar, Duri;
- Cao, Yue
- Article
43
- IET Intelligent Transport Systems (Wiley-Blackwell), 2014, v. 8, n. 2, p. 155, doi. 10.1049/iet-its.2012.0070
- Wang, Jian;
- Liu, Yanheng;
- Deng, Kevin
- Article
44
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 681, doi. 10.1049/ise2.12124
- Reno, Saha;
- Haque, Md. Mokammel
- Article
45
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 598, doi. 10.1049/ise2.12118
- He, Liukun;
- Wang, Liangmin;
- Cheng, Keyang;
- Xu, Yifan
- Article
46
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 505, doi. 10.1049/ise2.12112
- Bai, Wei;
- Cheng, Angxuan;
- Wang, Cailing;
- Pan, Zhisong
- Article
47
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 377, doi. 10.1049/ise2.12102
- Do, Ngoc‐Tuan;
- Hoang, Van‐Phuc;
- Doan, Van Sang;
- Pham, Cong‐Kha
- Article
48
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 161, doi. 10.1049/ise2.12051
- Shaohui, Mo;
- Tuerhong, Gulanbaier;
- Wushouer, Mairidan;
- Yibulayin, Tuergen
- Article
49
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 178, doi. 10.1049/ise2.12050
- Li, Huanruo;
- Guo, Yunfei;
- Sun, Penghao;
- Wang, Yawen;
- Huo, Shumin
- Article
50
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 2, p. 86, doi. 10.1049/ise2.12046
- Liu, Liang;
- Yin, Yue;
- Wu, Zhijun;
- Pan, Qingbo;
- Yue, Meng
- Article