Works matching DE "COMPUTER network security software"
Results: 16
On the leakage-resilient key exchange.
- Published in:
- Journal of Mathematical Cryptology, 2017, v. 11, n. 4, p. 215, doi. 10.1515/jmc-2016-0003
- By:
- Publication type:
- Article
Fighting the Fight: Cyber attacks on industrial control systems are increasing. What can you do?
- Published in:
- TCE: The Chemical Engineer, 2018, n. 923, p. 45
- By:
- Publication type:
- Article
the software scene.
- Published in:
- Internal Auditor, 2000, v. 57, n. 4, p. 49
- By:
- Publication type:
- Article
A histogram-based method for efficient detection of rewriting attacks in simple object access protocol messages.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 6, p. 492, doi. 10.1002/sec.934
- By:
- Publication type:
- Article
A security framework for developing service-oriented software architectures.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 17, p. 2957, doi. 10.1002/sec.1222
- By:
- Publication type:
- Article
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 5, p. 567, doi. 10.1002/sec.575
- By:
- Publication type:
- Article
Network Software Security and User Incentives.
- Published in:
- Management Science, 2006, v. 52, n. 11, p. 1703, doi. 10.1287/mnsc.1060.0568
- By:
- Publication type:
- Article
TTSASA: Three Tier Security against Sybil Attack.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 1, p. 62
- By:
- Publication type:
- Article
Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems.
- Published in:
- Informatica Economica, 2013, v. 17, n. 1, p. 144, doi. 10.12948/issn14531305/17.1.2013.12
- By:
- Publication type:
- Article
A Short-Term Forecasting Algorithm for Network Traffic Based on Chaos Theory and SVM.
- Published in:
- Journal of Network & Systems Management, 2011, v. 19, n. 4, p. 427, doi. 10.1007/s10922-010-9188-3
- By:
- Publication type:
- Article
Policy Management for Secure Data Access Control in Vehicular Networks.
- Published in:
- Journal of Network & Systems Management, 2011, v. 19, n. 4, p. 448, doi. 10.1007/s10922-010-9197-2
- By:
- Publication type:
- Article
An Assessment of Prime Software Repositories.
- Published in:
- Chinese Librarianship, 2012, n. 33, p. 1
- By:
- Publication type:
- Article
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1215, doi. 10.1007/s11277-016-3825-4
- By:
- Publication type:
- Article
A Composite Privacy Leakage Indicator.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 3, p. 511, doi. 10.1007/s11277-011-0383-7
- By:
- Publication type:
- Article
Special Issue on 'Internet of Things and Future Applications'.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies.
- Published in:
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 3, p. 209, doi. 10.1080/15501320701863460
- By:
- Publication type:
- Article