Search results
Create the page "Network security" on this wiki! See also the search results found.
- ...ks. Features including the extremely large number of sensor devices in the network, the severe power, computing and memory limitations, their dense, random de * Cryptography, Security and trust6 KB (750 words) - 16:50, 27 December 2015
- Computer System, Information Security and Networks • Network Dimensioning3 KB (319 words) - 17:07, 27 February 2009
- ...l Applications, Practice, Extensions, XML, Open Source, Model Development, Network Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Sy ...ng on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.38 KB (4,832 words) - 17:07, 27 February 2009
- | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems11 KB (1,440 words) - 17:08, 27 February 2009
- | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability12 KB (1,690 words) - 17:08, 27 February 2009
- | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability3 KB (480 words) - 17:08, 27 February 2009
- | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability6 KB (828 words) - 17:08, 27 February 2009
- * Measurement-based network management such as traffic engineering * Network applications such as multimedia streaming, gaming and on-line social networ6 KB (774 words) - 17:08, 27 February 2009
- * Project, risk and security management * Social network analysis4 KB (571 words) - 12:58, 9 March 2020
- |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security5 KB (578 words) - 10:21, 20 November 2020
- * Network management and planning * Network topology1 KB (148 words) - 10:22, 29 May 2016
- - Web Security and Privacy - Network systems, proxies and servers3 KB (440 words) - 15:25, 9 December 2009
- |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability4 KB (530 words) - 15:02, 27 December 2015
- |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC3 KB (477 words) - 16:54, 8 August 2009
- |Field=Network Virtual Environment -Trust and security issues in P2P systems5 KB (738 words) - 16:48, 10 August 2009
- * Network architectures and protocols * Network security and intrusion detection5 KB (630 words) - 11:13, 1 November 2009
- * Coordination and deployment of multi-robots system or wireless sensors network on site, * Security issues in agent-based systems for search and rescue missions, use of games,6 KB (783 words) - 17:04, 27 December 2015
- | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)3 KB (339 words) - 11:32, 2 August 2009
- ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies2 KB (230 words) - 11:32, 2 August 2009
- * Network-based applications * Network Security7 KB (1,054 words) - 16:43, 27 December 2015