Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 1016450 results
Sort by: relevance publication year

Synthesis of Cryptography and Security Attacks

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 1 to 5

Authors: M. Arora, S. Sharma

Information Security: A Review on Steganography with Cryptography for Secured Data Transaction

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 1 to 4

Authors: Kodge B. G.

Data Fusion in Wireless Sensor Network-A Survey

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 9 to 15

Authors: Ishita Chakraborty, Prodipto Das

Nonconventional Network Security Measures for Intrusion Detection

Journal Article published 2017 in International Journal of Advances in Scientific Research and Engineering

Drop of RERR Leads Routing Loop in AODV

Journal Article published Oct 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 5 on pages 6 to 9

Authors: Rajesh Dhakad, Abhinesh Kumar

Comparison of various Anonymization Technique

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 16 to 20

Authors: G. Pannu, S. Verma, U. Arora, A. K. Singh

Effective Scheduling in Networks - TRUMP

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 27 to 30

Authors: A. Caroline Mary, A. V. Senthil Kumar

A Study of Intrusion Detection System using Efficient Data Mining Techniques

Journal Article published Dec 2017 in International Journal of Scientific Research in Network Security and Communication volume 5 issue 6 on pages 5 to 8

Authors: P. Rutravigneshwaran

Proceedings of the 2017 the 7th International Conference on Communication and Network Security - ICCNS 2017

Proceedings published 2017

Analysis of Computer Network Security Problems and Countermeasures

Conference Paper published 2017 in Proceedings of the 2017 7th International Conference on Social Network, Communication and Education (SNCE 2017)

Authors: Feng Liao

Physical layer security transmission in cognitive radio network composed of multi-downlinks SU network

Conference Paper published Oct 2017 in 2017 IEEE 17th International Conference on Communication Technology (ICCT)

Authors: Xu Zhaoye, Lu Ruimin

Security Risk Estimation of Social Network Privacy Issue

Conference Paper published 2017 in Proceedings of the 2017 the 7th International Conference on Communication and Network Security - ICCNS 2017

Authors: Xueqin Zhang, Li Zhang, Chunhua Gu

Why communication is vital during a cyber-attack

Journal Article published Mar 2017 in Network Security volume 2017 issue 3 on pages 12 to 14

Authors: Nick Hawkins

Remote laboratory management centre REMLABNET embedded in University network - security and redundancy aspects

Conference Paper published 8 May 2017 in Proceedings of The 6th International Virtual Scientific Conference

Authors: P. Be┼ło, F. Schauer

Security Sector Reform and Research: An International Policy Network

Chapter published 20 Jul 2017 in Research in Security Sector Reform Policy on pages 97 to 122

Authors: Andrea Edoardo Varisco

Introduction to Network Security

Chapter published 3 Nov 2017 in Fundamentals of Data Communication Networks on pages 277 to 294

Cyber analysis emulation platform for wireless communication network protocols

Conference Paper published Oct 2017 in 2017 International Carnahan Conference on Security Technology (ICCST)

Authors: Brian Van Leeuwen, John Eldridge, Vincent Urias

Integration of network intrusion detection systems and honeypot networks for cloud security

Conference Paper published May 2017 in 2017 International Conference on Computing, Communication and Automation (ICCCA)

Authors: Varan Mahajan, Sateesh K Peddoju

BSS: Blockchain security over software defined network

Conference Paper published May 2017 in 2017 International Conference on Computing, Communication and Automation (ICCCA)

Authors: Sadhu Ram Basnet, Subarna Shakya

Requirement analysis for abstracting security in software defined network

Conference Paper published Jul 2017 in 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)

Authors: Ajay Nehra, Meenakshi Tripathi, M.S. Gaur