Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 6 of 13472183 results
Sort by: relevance publication year

Research on the correlation of Shanghai composite index and the S&P500 index based on M-Copula-EGARCH

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 395 to 398

Authors: C Liu, X Gao, H Pan, J Li, X Liu

Analysis and research on information management of SME based on BPR method

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 549 to 551

Authors: Z Lu, Y Han, R Wang

Protect the semantic network identity: Attribute-based searchable encryption over routing in named data network

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 11 to 14

Authors: X Jiang, Q Huang

NETWORK SECURITY CHALLENGES – A Survey

Journal Article published 24 Apr 2018 in International Journal of Recent Trends in Engineering and Research volume 4 issue 4 on pages 343 to 355

SECURITY ANALYSIS OF TCP/IP NETWORKS - An Approach to Automatic Analysis of Network Security Properties

Conference Paper published 2010 in Proceedings of the International Conference on Data Communication Networking and Optical Communication Systems

Implementation of RSA security protocol for sensor network security: Design and network lifetime analysis

Conference Paper published Feb 2011 in 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)

Authors: Avijit Sahana, Iti Saha Misra

Secured Network Model for Management Information System Based On IP Security (IPSec) Encryption Using Multilayered Approach of Network Security

Conference Paper published in 2005 International Conference on Information and Communication Technologies

Authors: A.H. Pathan, M. Irshad

Security Risk Estimation of Social Network Privacy Issue

Conference Paper published 2017 in Proceedings of the 2017 the 7th International Conference on Communication and Network Security - ICCNS 2017

Authors: Xueqin Zhang, Li Zhang, Chunhua Gu

Information and Communication Technology Security Network

Chapter published in Handbook of Research on Information Communication Technology Policy on pages 421 to 433

Authors: Ogochukwu Thaddaeus Emiri, Chukwunweike Gracious Omede

Information and Communication Technology Security Network

Chapter published in Handbook of Research on Information Communication Technology Policy

Authors: Ogochukwu Thaddaeus Emiri, Chukwunweike Gracious Omede

Why communication is vital during a cyber-attack

Journal Article published Mar 2017 in Network Security volume 2017 issue 3 on pages 12 to 14

Authors: Nick Hawkins

Domain 4: Communication and Network Security (Designing and Protecting Network Security)

Chapter published 2016 in CISSP Study Guide on pages 219 to 291

Authors: Eric Conrad, Seth Misenar, Joshua Feldman

4G Mobile Communication Network System Security Faced with Threat Question Research

Journal Article published Nov 2011 in Advanced Materials Research volume 403-408 on pages 1564 to 1567

Authors: Xin Min Wu, Hao Shu Wu

Power systems management and associated information exchange. Data and communications security

Standard published

Power systems management and associated information exchange. Data and communications security

Standard published

Power systems management and associated information exchange. Data and communications security

Standard published

Power systems management and associated information exchange. Data and communications security

Standard published

Mandatory access control scheme based on security label for state power control system

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 25 to 29

Authors: K Gao, Z Guo, Z Wang, X Li

Application of a security protocol to wireless multiple access systems

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 97 to 100

Authors: Ajung Kim

Cloud storage security

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 123 to 126

Authors: T Galibus, H Vissia