Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 8 of 13839594 results
Sort by: relevance publication year

A workflow hierarchical system modeling approach for dust concentration network sensor

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 495 to 498

Authors: X Cheng, P Wang, X Bai, Y Yu, J Liu, L Cui

An automatic network protocol reverse engineering method for vulnerability discovery

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 49 to 53

Authors: X Wu, H Ma, D Gu

Visuality and Security

Book published 28 Mar 2018 in Oxford Research Encyclopedia of Communication

Authors: Axel Heck

Special issue on recent advances in network and information security-security and communication networks journal

Journal Article published 15 Dec 2014 in Security and Communication Networks volume 8 issue 1 on pages 1 to 1

Authors: Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou

Intelligent network security assessment with modeling and analysis of attack patterns

Journal Article published 27 Jun 2012 in Security and Communication Networks volume 5 issue 12 on pages 1471 to 1486

Authors: Suleyman Kondakci

Security analysis of network protocols through model checking: a case study on mobile IPv6

Journal Article published 16 Dec 2015 in Security and Communication Networks volume 9 issue 10 on pages 1072 to 1084

Authors: Zohreh Saffarian Eidgahi, Vahid Rafe

Investigation of security issues for service-oriented network architecture

Journal Article published 28 Dec 2015 in Security and Communication Networks volume 9 issue 10 on pages 1025 to 1039

Authors: Bhawana Rudra, Om Prakash Vyas

On the security of PPPoE network

Journal Article published 8 Feb 2012 in Security and Communication Networks volume 5 issue 10 on pages 1159 to 1168

Authors: Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng

Security Sector Reform and Research: An International Policy Network

Chapter published 20 Jul 2017 in Research in Security Sector Reform Policy on pages 97 to 122

Authors: Andrea Edoardo Varisco

Evaluation of two wireless communication standards for public safety and security (PSS) network

Dissertation published

Authors: Ahmed Alsuwaidi

Introduction to Network Security

Chapter published 3 Nov 2017 in Fundamentals of Data Communication Networks on pages 277 to 294

Near Field Communication [102]

Chapter published 3 May 2018 in Wireless Network Security on pages 139 to 146

Authors: Wolfgang Osterhage

Emergency Management in Communication Networks

Chapter published 3 May 2018 in Wireless Network Security on pages 159 to 176

Authors: Wolfgang Osterhage

Network Security

Chapter published in Introduction to Broadband Communication Systems on pages 341 to 361

Communication Security

Chapter published 2007 in How to Cheat at Securing Your Network on pages 165 to 236

Communication Security

Chapter published 2007 in How to Cheat at Securing Your Network on pages 105 to 164

Communication Security

Chapter published 2007 in How to Cheat at Securing Your Network on pages 65 to 104

Call for papers: systematic network optimizations for security parameters (security and communication networks)

Journal Article published 10 Mar 2014 in Security and Communication Networks volume 7 issue 11 on pages 2180 to 2180

Authors: Hongmei Zhang, Yongzhuang Wei, Rongxing Lu, Rose Qingyang Hu

Modeling GSM Based Network Communication in Vehicular Network

Journal Article published 8 Feb 2014 in International Journal of Computer Network and Information Security volume 6 issue 3 on pages 37 to 43

Authors: M. Milton Joe, B. Ramakrishnan, R. S. Shaji

A research process that ensures reproducible network security research

Conference Paper published Nov 2015 in 2015 11th International Conference on Network and Service Management (CNSM)

Authors: Sebastian Abt, Harald Baier