Search results

Jump to: navigation, search
  • ...ks. Features including the extremely large number of sensor devices in the network, the severe power, computing and memory limitations, their dense, random de * Cryptography, Security and trust
    6 KB (750 words) - 16:50, 27 December 2015
  • Computer System, Information Security and Networks • Network Dimensioning
    3 KB (319 words) - 17:07, 27 February 2009
  • ...l Applications, Practice, Extensions, XML, Open Source, Model Development, Network Modeling, Distributed Simulation and Industry, Modeling Very Large Scale Sy ...ng on line, Computational resources are becoming cheaper, while ubiquitous network access has started to appear.
    38 KB (4,832 words) - 17:07, 27 February 2009
  • | Title = The 12th International Conference on Network-Based Information Systems The 12th International Conference on Network-Based Information Systems
    11 KB (1,440 words) - 17:08, 27 February 2009
  • | Title = 2009 World Congress on Privacy, Security, Trust and the Management of e-Business | Field = Computer security and reliability
    12 KB (1,690 words) - 17:08, 27 February 2009
  • | Title = Second SETOP International Workshop on Autonomous and Spontaneous Security | Field = Computer security and reliability
    3 KB (480 words) - 17:08, 27 February 2009
  • | Title = 14th European Symposium on Research in Computer Security | Field = Computer security and reliability
    6 KB (828 words) - 17:08, 27 February 2009
  • * Measurement-based network management such as traffic engineering * Network applications such as multimedia streaming, gaming and on-line social networ
    6 KB (774 words) - 17:08, 27 February 2009
  • * Project, risk and security management * Social network analysis
    4 KB (571 words) - 12:58, 9 March 2020
  • |Title=International Journal of Computer Science and Information Security |Field=Computer Science, Information Security
    5 KB (578 words) - 10:21, 20 November 2020
  • * Network management and planning * Network topology
    1 KB (148 words) - 10:22, 29 May 2016
  • - Web Security and Privacy - Network systems, proxies and servers
    3 KB (440 words) - 15:25, 9 December 2009
  • |Title=5th European Conference on Computer Network Defence |Field=Computer security and reliability
    4 KB (530 words) - 15:02, 27 December 2015
  • |Title=International Workshop on Wireless Multimedia Computing and Security Services - Security, privacy, and cryptographic protocols for WMC
    3 KB (477 words) - 16:54, 8 August 2009
  • |Field=Network Virtual Environment -Trust and security issues in P2P systems
    5 KB (738 words) - 16:48, 10 August 2009
  • * Network architectures and protocols * Network security and intrusion detection
    5 KB (630 words) - 11:13, 1 November 2009
  • * Coordination and deployment of multi-robots system or wireless sensors network on site, * Security issues in agent-based systems for search and rescue missions, use of games,
    6 KB (783 words) - 17:04, 27 December 2015
  • | Title = International journal of Network Security & Its Applications (IJNSA) International journal of Network Security & Its Applications (IJNSA)
    3 KB (339 words) - 11:32, 2 August 2009
  • ...their research results and address open issues in Wireless Communications, Network Technologies, Services and Application. Network Technologies
    2 KB (230 words) - 11:32, 2 August 2009
  • * Network-based applications * Network Security
    7 KB (1,054 words) - 16:43, 27 December 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)