Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 8 of 12886163 results
Sort by: relevance publication year

Campus Network Security Analysis and Design of Security System

Conference Paper published Dec 2015 in 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

Authors: Song Ji, Ling Pang, Wenying Xia

Assessment of network security policy based on security capability

Conference Paper published Nov 2008 in 2008 11th IEEE Singapore International Conference on Communication Systems

Authors: Chenghua Tang, Shunzheng Yu

Security Issues of Distance Vector Routing Protocol and Its Advancement in Security

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: N. Singh, P. Chauhan, N. Chandra

EIR Based Mobile Communication Network Security Technology

Conference Paper published Nov 2011 in 2011 Third International Conference on Multimedia Information Networking and Security

Authors: Dong Hui, Huan Lei

POLICY-BASED SECURITY CHANNELS FOR PROTECTING NETWORK COMMUNICATION IN MOBILE CLOUD COMPUTING

Conference Paper published 2011 in Proceedings of the International Conference on Security and Cryptography

Honeypot in network security

Conference Paper published 2011 in Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS '11

Authors: Abhishek Mairh, Debabrat Barik, Kanchan Verma, Debasish Jena

Cyber-Security for the Controller Area Network (CAN) Communication Protocol

Conference Paper published Dec 2012 in 2012 International Conference on Cyber Security

Authors: Chung-Wei Lin, Alberto Sangiovanni-Vincentelli

New Algorithm for Wireless Network Communication Security

Journal Article published 30 Dec 2016 in International Journal on Cryptography and Information Security volume 6 issue 3/4 on pages 01 to 08

Authors: Sirwan Ahmed, Majeed Nader

Impact of Security on QoS in Communication Network

Conference Paper published Apr 2009 in 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing

Authors: Jianyong Chen, Cunying Hu, Huawang Zeng, Jun Zhang

Security defense model of Modbus TCP communication based on Zone/Border rules

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 79 to 86

Authors: W Shang, L Li, M Wan, P Zeng