Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 5 of 13472171 results
Sort by: relevance publication year

Importance of Cryptography in Network Security

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: T. R. Devi

Cellular Communication Network Modeling Method Based on Cytokines

Conference Paper published May 2011 in 2011 International Conference on Network Computing and Information Security

Authors: Yan-jun Hua, Gang-chang Pang

MLF: A Technology beyond ALF for Network Security

Conference Paper published Jun 2011 in 2011 International Conference on Communication Systems and Network Technologies

Authors: Rajesh Sodhani, A.K. Goyal, Basant Singh Rathore

Network security intrusion detection system based on incremental improved convolutional neural network model

Conference Paper published Oct 2016 in 2016 International Conference on Communication and Electronics Systems (ICCES)

Authors: Chao Deng, Haiye Qiao

The Evaluation Model for Network Security

Conference Paper published Apr 2014 in 2014 Fourth International Conference on Communication Systems and Network Technologies

Authors: Zhiyong Lu, Yunyan Zhou

Power systems management and associated information exchange. Data and communications security

Standard published

Power systems management and associated information exchange. Data and communications security

Standard published

Network communication based on 6LoWPAN and ZigBee

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 499 to 504

Authors: F Di, B Luo, Z Sun

Optimal Game Theory for Network Security using IPDRS Engine

Journal Article published 30 Jan 2015 in IJARCCE on pages 40 to 45

Authors: Shyam Chandran P, Resmi .A.M

Security in Vehicular Ad-hoc Network Using Digital Envelop in Distributed Environment

Journal Article published 30 Mar 2015 in IJARCCE on pages 52 to 57

Authors: Prakash Tripathi, Dr.Kanojia Sindhuben Babulal

Network Security Based on K-Means Clustering Algorithm in Data Mining Research

Conference Paper published 2018 in Proceedings of the 8th International Conference on Social Network, Communication and Education (SNCE 2018)

Authors: Chunfen Bu

The Research and Application of Network Security Technology in the University Network

Conference Paper published 2013 in Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation

Authors: Ling Jia

The research and design of embed RSA encryption algorithm network encryption card driver

Conference Paper published May 2013 in PROCEEDINGS OF 2013 International Conference on Sensor Network Security Technology and Privacy Communication System

Authors: Jingyang Gao, Hai Cheng, Ziheng Yang, Qun Ding

Scientific Communication and National Security

Book published 1 Jan 1982

Network Security Scientific and Research Laboratory

Chapter published 2003 in Security Education and Critical Infrastructures on pages 231 to 241

Authors: Natalia Miloslavskaia, Alexander Tolstoi

The research on the space–time statistic characteristics of moving Sonar reverberation and its simulation method

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 635 to 638

Authors: J Liu, L Zhu

Research on MDA and SOA integrated software craftsmanship

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 653 to 656

Authors: Q Wang, L Liu, J Chen, J Lian, Z Pei

Research on key technology of three-dimensional talking-head driven by the Chinese text

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 597 to 600

Authors: L Shi, P Feng, J Zhao, J Tao

Research on text classification based on inverted-index in cloud computing data center

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 167 to 171

Authors: G Yang, L Chen, L Chen, B Meng

Research of a high power factor mobile phone charger based on L6561 and TinySwitch

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 163 to 166

Authors: D Chen