Search Results - Computer networks Security features
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 76
- Computational intelligence 76
- Communications Engineering, Networks 65
- Telecommunication 65
- Artificial intelligence 50
- Artificial Intelligence 49
- Signal processing 49
- Signal, Speech and Image Processing 49
- Data and Information Security 23
- Data protection 23
- Computer networks 17
- Data Mining and Knowledge Discovery 16
- Data mining 16
- Computer Communication Networks 15
- Application software 13
- Computer and Information Systems Applications 13
- Security Science and Technology 10
- Security systems 10
- Control engineering 7
- Applied Dynamical Systems 6
- Dynamics 6
- Electronic Circuits and Systems 6
- Electronic circuits 6
- Electronics 6
- Electronics and Microelectronics, Instrumentation 6
- Nonlinear theories 6
- Big Data 5
- Big data 5
- Computer vision 5
- Control and Systems Theory 5
-
1
Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…Internet of Things & Wireless Physical Layer Security: A Survey -- Approach Towards increasing efficiency of communication protocol in wireless sensor network using modified routing protocol -- Privacy Preservation in Cloud Computing with Double Encryption Method -- A Machine learning based approach for Opinion Mining on Social Network Data -- Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks -- Correction of Ocular Artifacts from EEG by DWT with an Improved Thresholding -- EGRP: Enhanced Geographical Routing protocol for Vehicular Adhoc Networks -- PAPR Performance Analysis of Unitary transforms in SLM-OFDM for WLAN 802.11a Mobile terminals -- Optimal Sensing Time allocation for Energy Efficient Data Transmission in Amplify-Forward Cognitive Relay Assisted Network -- Data Privacy in Online Shopping -- Design and Performance of Resonant Spacing Linear Patch Array with Quarter wave transformer feed Network for Wireless Applications -- Performance analysis of PUEA and SSDF attacks in Cognitive Radio Networks -- Design of a 3.4 GHz Wide-Tuning-Range VCO in 0.18 µm CMOS -- A New Iterative Hybrid Edge Technique Using Image Mosaic -- Performance of Optimized Reversible Vedic Multipliers -- Improved In-System Debugging of High Level Synthesis Generated FPGA Circuits -- Congestion Control Mechanism for Real Time Traffic in Mobile Adhoc Networks -- Impact of Facebook’s Check-in Feature on Users of Social Networking Sites -- A Novel Congestion Control Scheme in VANET.…”
Full-text access
e-Book -
2
SDN and NFV Security Security Analysis of Software-Defined Networking and Network Function Virtualization /
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
3
Advances in Network Systems Architectures, Security, and Applications /
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book -
4
International Conference on Computer Networks and Communication Technologies ICCNCT 2018 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Full-text access
e-Book -
5
Introduction to Computer Networking
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book -
6
5G Enabled Secure Wireless Networks
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
7
Software Design for Resilient Computer Systems
Published Springer International Publishing : Imprint: Springer, 2016.Full-text access
e-Book -
8
Innovations in Computer Science and Engineering Proceedings of the Sixth ICICSE 2018 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Named Entity Recognition in Tamil Language Using Recurrent based Sequence Model -- Quantum Digital Signature based Group Key Management in E-Commerce -- Predicting the Risk of Readmission of Diabetic Patients Using Deep Neural Networks -- Reliable Healthcare Monitoring System Using SPOC Framework -- Computer Aided Lung Parenchyma Segmentation Using Supervised Learning -- Gender Identification of Code Mixed Malayalam-English Data from WhatsApp -- Comparative Study of Machine Learning Approaches for Heart Transplantation -- Enhanced Trust based Cluster Head Selection in Wireless Sensor Networks -- Homomorphic Encryption Scheme to Enhance the Security of Data -- An Effective Data Transmission Approach through Cascading of Clusters in Path Identification for WSN Routing -- An Inception towards better Classification Technique for Big Data -- A Hybrid Feature Selection Approach for Handling a High Dimensional Data -- Improved Clustering Technique Using Meta Data for Text Mining -- Privacy Preservationin Healthcare by Process Mining.…”
Full-text access
e-Book -
9
Advanced Computing and Systems for Security Volume Three /
Published Springer Nature Singapore : Imprint: Springer, 2017.Full-text access
e-Book -
10
Advanced Computing and Systems for Security Volume Four /
Published Springer Nature Singapore : Imprint: Springer, 2017.Full-text access
e-Book -
11
Advanced Computing and Systems for Security Volume 2 /
Published Springer India : Imprint: Springer, 2016.Full-text access
e-Book -
12
Application of Social Media in Crisis Management Advanced Sciences and Technologies for Security Applications /
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book -
13
Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 /
Published Springer Nature Singapore : Imprint: Springer, 2016.Table of Contents: “…Towards Evolutionary Multitasking: A New Paradigm in Evolutionary Computation -- 4. Generating a Standardized Upper Ontology for Security of Information and Networks -- Part II_Computational Intelligence: Chapter 1. …”
Full-text access
e-Book -
14
Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security /
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
15
Cloud Computing Concepts and Practices /
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
16
Security Challenges and Approaches in Internet of Things
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book -
17
Biometric Security and Privacy Opportunities & Challenges in The Big Data Era /
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book -
18
Proceedings of International Conference on Communication and Networks ComNet 2016 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…New Approach for Performance and Security Enhancement in OCDMA Networks -- Chapter 69. …”
Full-text access
e-Book -
19
Systems Engineering in Context Proceedings of the 16th Annual Conference on Systems Engineering Research /
Published Springer International Publishing : Imprint: Springer, 2019.Full-text access
e-Book -
20
On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids /
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book