Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 388508 results
Sort by: relevance publication year

Assessment of network security policy based on security capability

Conference Paper published Nov 2008 in 2008 11th IEEE Singapore International Conference on Communication Systems

Authors: Chenghua Tang, Shunzheng Yu

Security-aware beacon based network monitoring

Conference Paper published Nov 2008 in 2008 11th IEEE Singapore International Conference on Communication Systems

Authors: Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi

Security management in Kerberos V5 for GSM network

Conference Paper published Dec 2008 in 2008 International Conference on Computing, Communication and Networking

Authors: M. Jaiganesh, B. Ramdoss

Managing Network Security Projects: Classification models and Scale Effect

Conference Paper published Apr 2008 in 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications

Authors: Jihene Krichene, Noureddine Boudriga

Mobile Intelligent Network security with SIP Authentication Procedure

Conference Paper published Apr 2008 in 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications

Authors: Handoura Abdallah, Bourget Daniel

SECURE COMMUNICATION IN MOBILE AD HOC NETWORK USING EFFICIENT CERTIFICATELESS ENCRYPTION

Conference Paper published 2008 in Proceedings of the International Conference on Security and Cryptography

A Novel Network Security Defence Mechanism Based on Multi-SoftMan

Conference Paper published 2008 in 2008 ISECS International Colloquium on Computing, Communication, Control, and Management

Authors: Zhanfei Ma, Xuefeng Zheng

Research on the Security of Information and Data in the Communication

Conference Paper published 2008 in 2008 International Symposium on Electronic Commerce and Security

Authors: Xiaoming Han

New BESA Algorithm Development and Design for Network Security in Multimedia Communication

Conference Paper published Jan 2008 in 2008 International Conference on Information Science and Security (ICISS 2008)

Authors: Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra, Sang-Keon Lee

Police Security Communication over Public Cellular Network Infrastructure

Conference Paper published Jul 2008 in 2008 Seventh IEEE International Symposium on Network Computing and Applications

Authors: Rongyu He, Chaowen Chang, Guolei Zhao, Zheng Qin, Xi Qin

Application of Radial Function Neural Network in Network Security

Conference Paper published Dec 2008 in 2008 International Conference on Computational Intelligence and Security

Authors: Yi Niu, Yi Chun Peng

Web security flaws up

Journal Article published Sep 2008 in Network Security volume 2008 issue 9 on page 20

Communication Security in GSM Networks

Conference Paper published Dec 2008 in 2008 International Conference on Security Technology

Authors: Petr Bouška, Martin Drahanský

Differentiating Data Security and Network Security

Conference Paper published 2008 in 2008 IEEE International Conference on Communications

Authors: S. V. Kartalopoulos

A Composite Network Security Assessment

Conference Paper published Sep 2008 in 2008 The Fourth International Conference on Information Assurance and Security

Authors: Suleyman Kondakci

Sensor network security issues at network layer

Conference Paper published Nov 2008 in 2008 2nd International Conference on Advances in Space Technologies

Authors: Asif Habib

VEA-bility Security Metric: A Network Security Analysis Tool

Conference Paper published Mar 2008 in 2008 Third International Conference on Availability, Reliability and Security

Authors: Melanie Tupper, A. Nur Zincir-Heywood

BERR: More work to do on security

Journal Article published May 2008 in Network Security volume 2008 issue 5 on page 2

Selling security to top management

Journal Article published Mar 2008 in Network Security volume 2008 issue 3 on pages 18 to 20

Authors: Dario Forte

Symantec prepares for managed security services

Journal Article published Mar 2008 in Network Security volume 2008 issue 3 on pages 1 to 2