Funding Data Link References Status API Help
Page 1 of 1029200 results
Sort by: relevance publication year

Simulation of RF signal hybrid modulation in wireless communication network under big data

Journal Article published 11 Dec 2018 in Journal of Ambient Intelligence and Humanized Computing

Research funded by Natural Science Foundation of Inner Mongolia (2018MS6010) | Shanxi Information Fund Project 2016 (Research on support services of network information security based on knowledge engineering) | Foundation Science Research Start-up Fund of Inner Mongolia Agriculture University (JC2016005) | Scientific Research Foundation for Doctors of Inner Mongolia Agriculture University (NDYB2016-11)

Authors: Hui Zhang, Weina Fu

Using targeted Bayesian network learning for suspect identification in communication networks

Journal Article published 8 Feb 2017 in International Journal of Information Security volume 17 issue 2 on pages 169 to 181

Authors: A. Gruber, I. Ben-Gal

Resistance and Security Index of Networks: Structural Information Perspective of Network Security

Journal Article published 3 Jun 2016 in Scientific Reports volume 6 issue 1

Authors: Angsheng Li, Qifu Hu, Jun Liu, Yicheng Pan

Security risk situation quantification method based on threat prediction for multimedia communication network

Journal Article published 15 Jan 2018 in Multimedia Tools and Applications volume 77 issue 16 on pages 21693 to 21723

Research funded by National High Technology Research and Development Program of China (2012AA012704, 2015AA016006) | National Key Research and Development Program of China (2016YFF0204003) | The Equipment Pre-research Foundation during the 13th Five-Year Plan (61400020201) | CCF-Venus “Hongyan” research plan of China (2017003) | The Key Lab of Information Network Security, Ministry of Public Security (C15604)

Authors: Hao Hu, Hongqi Zhang, Yingjie Yang

Ensuring security in depth based on heterogeneous network security technologies

Journal Article published 24 Mar 2009 in International Journal of Information Security volume 8 issue 4 on pages 233 to 246

Authors: Meharouech Sourour, Bouhoula Adel, Abbes Tarek

International Scientific Relations and National Security

Journal Article published Dec 1952 in Nature volume 170 issue 4338 on pages 1033 to 1036

Scientific Research and Security Measures

Journal Article published Apr 1950 in Nature volume 165 issue 4200 on pages 657 to 659

Metaphors advance scientific research

Journal Article published Oct 2013 in Nature volume 502 issue 7471 on pages 303 to 303

Authors: Andrea Loettgers

Rigorous automated network security management

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 29 to 48

Authors: Joshua D. Guttman, Amy L. Herzog

Game strategies in network security

Journal Article published Feb 2005 in International Journal of Information Security volume 4 issue 1-2 on pages 71 to 86

Authors: Kong-wei Lye, Jeannette M. Wing