Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 603544 results
Sort by: relevance publication year

Research on Trusted Programming Technology in Information Security

Conference Paper published May 2012 in 2012 International Conference on Communication Systems and Network Technologies

Authors: Jian-ping Cai, Wen-ying Xu

Cyber-Security for the Controller Area Network (CAN) Communication Protocol

Conference Paper published Dec 2012 in 2012 International Conference on Cyber Security

Authors: Chung-Wei Lin, Alberto Sangiovanni-Vincentelli

Intelligent network security assessment with modeling and analysis of attack patterns

Journal Article published 27 Jun 2012 in Security and Communication Networks volume 5 issue 12 on pages 1471 to 1486

Authors: Suleyman Kondakci

On the security of PPPoE network

Journal Article published 8 Feb 2012 in Security and Communication Networks volume 5 issue 10 on pages 1159 to 1168

Authors: Fanbao Liu, Tao Xie, Yumeng Feng, Dengguo Feng

Design and Implementation of High Security Mobile Payment System

Conference Paper published May 2012 in 2012 International Conference on Communication Systems and Network Technologies

Authors: Jian Xu, TieJun Pan, LeiNa Zheng

New Mobile Commerce Security Solution Based on WPKI

Conference Paper published May 2012 in 2012 International Conference on Communication Systems and Network Technologies

Authors: Pan Tiejun, Zheng Leina

A New Network Security Model Based on Machine Learning

Conference Paper published Dec 2012 in 2012 International Conference on Control Engineering and Communication Technology

Authors: Hai-Sheng Wang, Xiao-Lin Gui

Establishing the security foundations for network protocol design

Conference Paper published Nov 2012 in 2012 IEEE 14th International Conference on Communication Technology

Authors: Zebo Feng, Xiaoping Wu, Liangli Ma, Wei Ren

Multicast network security using quantum key distribution (QKD)

Conference Paper published Jul 2012 in 2012 International Conference on Computer and Communication Engineering (ICCCE)

Authors: Sellami Ali, Omer Mahmoud, Aisha A. Hasan

The Solution Design Using USB Key for Network Security Authentication

Conference Paper published Nov 2012 in 2012 Fourth International Conference on Computational Intelligence and Communication Networks

Authors: Chengjion Wang

Security State Fusion Based on Network Accessing Control Algorithm

Conference Paper published Nov 2012 in 2012 Fourth International Conference on Computational Intelligence and Communication Networks

Authors: Yunjie Jiang

Special issue on next generation communication and network security

Journal Article published 28 Aug 2012 in Security and Communication Networks volume 5 issue 10 on pages 1083 to 1085

Authors: Taeshik Shon, Costas Lambrinoudakis, Xiaobo Zhou

New research institute to study threats

Journal Article published Sep 2012 in Network Security volume 2012 issue 9 on page 20

Citation Analysis of Network Security Literature Output During 2002 to 2012

Journal Article published 1 Jun 2012 in International Journal of Scientific Research volume 2 issue 2 on pages 185 to 187

Authors: Dr. N. Amsaveni Dr. N. Amsaveni, Assistant Professor, Department of Library & Information Science, Bharathidasan University, Trichy- 620 024, Tamil Nadu, R.Vasanthi R.Vasanthi

How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks

Journal Article published 2012 in International Journal of Security and Networks volume 7 issue 3 on page 133

Authors: Kun Peng

Mobile Communication Systems and Related Security Issues

Chapter published 22 Sep 2012 in Computer Communications and Networks on pages 431 to 446

Authors: Joseph Migga Kizza

Improving intrusion detection for imbalanced network traffic

Journal Article published 10 Jul 2012 in Security and Communication Networks volume 6 issue 3 on pages 309 to 324

Authors: Ciza Thomas

Hybrid intelligent systems for detecting network intrusions

Journal Article published 11 Jul 2012 in Security and Communication Networks volume 8 issue 16 on pages 2741 to 2749

Authors: Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra

Network specific vulnerability based alert reduction approach

Journal Article published 29 Mar 2012 in Security and Communication Networks volume 6 issue 1 on pages 15 to 27

Authors: Humphrey Waita Njogu, Luo Jiawei, Jane Nduta Kiere

A graph-theoretic framework for isolating botnets in a network

Journal Article published 28 Feb 2012 in Security and Communication Networks volume 8 issue 16 on pages 2605 to 2623

Authors: Padmini Jaikumar, Avinash C. Kak