Funding Data Link References Status API Help
Page 1 of 909195 results
Sort by: relevance publication year

Network and System Security

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 1 to 1

Research and design of network security coordinated recovery system

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 19 to 23

Authors: J Xia, L Jiao, S Zhao, L Li

Author index

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 669 to 671

Grid and Cloud Computing

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 121 to 121

Data mining

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 389 to 389

Executive Communication

Chapter published in Advances in Information Security on pages 163 to 178

Initial Employee Communication

Chapter published in Advances in Information Security on pages 103 to 116

Telecommunication and Network Security

Chapter published 13 Sep 2011 in Information Security Management Handbook, Sixth Edition, Volume 5 on pages 67 to 68

Security defense model of Modbus TCP communication based on Zone/Border rules

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 79 to 86

Authors: W Shang, L Li, M Wan, P Zeng

Network communication based on 6LoWPAN and ZigBee

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 499 to 504

Authors: F Di, B Luo, Z Sun

Network Security Scientific and Research Laboratory

Chapter published 2003 in Security Education and Critical Infrastructures on pages 231 to 241

Authors: Natalia Miloslavskaia, Alexander Tolstoi

The research on the space–time statistic characteristics of moving Sonar reverberation and its simulation method

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 635 to 638

Authors: J Liu, L Zhu

Research on MDA and SOA integrated software craftsmanship

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 653 to 656

Authors: Q Wang, L Liu, J Chen, J Lian, Z Pei

Research on key technology of three-dimensional talking-head driven by the Chinese text

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 597 to 600

Authors: L Shi, P Feng, J Zhao, J Tao

Research on text classification based on inverted-index in cloud computing data center

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 167 to 171

Authors: G Yang, L Chen, L Chen, B Meng

Research of a high power factor mobile phone charger based on L6561 and TinySwitch

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 163 to 166

Authors: D Chen

Research on the correlation of Shanghai composite index and the S&P500 index based on M-Copula-EGARCH

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 395 to 398

Authors: C Liu, X Gao, H Pan, J Li, X Liu

Analysis and research on information management of SME based on BPR method

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 549 to 551

Authors: Z Lu, Y Han, R Wang

Protect the semantic network identity: Attribute-based searchable encryption over routing in named data network

Chapter published 29 Jun 2015 in Network Security and Communication Engineering on pages 11 to 14

Authors: X Jiang, Q Huang

Information and Communication Technology Security Network

Chapter published in Handbook of Research on Information Communication Technology Policy on pages 421 to 433

Authors: Ogochukwu Thaddaeus Emiri, Chukwunweike Gracious Omede