Works matching DE "COMPUTER networks -- Safety measures"
Results: 18
Security Issues and Modified Version of PKM Protocol in Non-Transparent Multihop Relay in IEEE 802.16j Networks.
- Published in:
- International Review on Computers & Software, 2011, v. 6, n. 1, p. 104
- By:
- Publication type:
- Article
Modeling the spread of virus in packets on scale free network.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2016, v. 27, n. 6, p. 1, doi. 10.1142/S0129183116500686
- By:
- Publication type:
- Article
The Best Way to Plan for the Worst.
- Published in:
- Audiology Today, 2009, v. 21, n. 5, p. 12
- Publication type:
- Article
An Efficient Network Attack Visualization Using Security Quad and Cube.
- Published in:
- ETRI Journal, 2011, v. 33, n. 5, p. 770, doi. 10.4218/etrij.11.0110.0570
- By:
- Publication type:
- Article
An abstract interpretation-based model for safety semantics.
- Published in:
- International Journal of Computer Mathematics, 2011, v. 88, n. 4, p. 665, doi. 10.1080/00207161003703205
- By:
- Publication type:
- Article
Advances on data, information, and knowledge in the internet of things.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
ЗАЩИТА НА ИНФОРМАЦИЯТА НА КОМУНИКАЦИОННИ И КОМПЮТЪРНИ МРЕЖИ
- Published in:
- Vocational Education, 2017, v. 19, n. 3, p. 289
- By:
- Publication type:
- Article
Online monitoring for safety-critical multicore systems.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 5, p. 215, doi. 10.1515/itit-2017-0028
- By:
- Publication type:
- Article
Attack's Feature Selection-Based Network Intrusion Detection System Using Fuzzy Control Language.
- Published in:
- International Journal of Fuzzy Systems, 2017, v. 19, n. 2, p. 316, doi. 10.1007/s40815-016-0160-6
- By:
- Publication type:
- Article
Secure and private key management scheme in big data networking.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 5, p. 992, doi. 10.1007/s12083-017-0579-z
- By:
- Publication type:
- Article
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 1, p. 33, doi. 10.1007/s10207-010-0117-y
- By:
- Publication type:
- Article
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs.
- Published in:
- Journal of Network & Systems Management, 2008, v. 16, n. 3, p. 259, doi. 10.1007/s10922-008-9109-x
- By:
- Publication type:
- Article
Effectiveness of GNSS Spoofing Countermeasure Based on Receiver CNR Measurements.
- Published in:
- International Journal of Navigation & Observation, 2012, p. 1, doi. 10.1155/2012/501679
- By:
- Publication type:
- Article
Searching for a black hole in arbitrary networks: optimal mobile agents protocols.
- Published in:
- Distributed Computing, 2006, v. 19, n. 1, p. 1, doi. 10.1007/s00446-006-0154-y
- By:
- Publication type:
- Article
High Throughput AES Algorithm Using Parallel Subbytes and MixColumn.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1433, doi. 10.1007/s11277-016-3858-8
- By:
- Publication type:
- Article
Enhancing Trusted Cloud Computing Platform for Infrastructure as a Service.
- Published in:
- Advances in Electrical & Computer Engineering, 2017, v. 17, n. 1, p. 9, doi. 10.4316/AECE.2017.01002
- By:
- Publication type:
- Article
Reliable and Swift Message Broadcast Method in Vehicular Ad Hoc Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/219689
- By:
- Publication type:
- Article
THE FIRST RESPONDER NETWORK (FIRSTNET) AND NEXT-GENERATION COMMUNICATIONS FOR PUBLIC SAFETY: ISSUES FOR CONGRESS.
- Published in:
- Journal of Current Issues in Media & Telecommunications, 2015, v. 7, n. 4, p. 449
- By:
- Publication type:
- Article