Search Results - "network security"
Suggested Topics within your search.
Suggested Topics within your search.
- Communications Engineering, Networks 25
- Telecommunication 25
- Computational Intelligence 21
- Computational intelligence 21
- Data and Information Security 18
- Data protection 18
- Signal processing 14
- Signal, Speech and Image Processing 13
- Artificial Intelligence 11
- Artificial intelligence 11
- Bilgisayar ağları 9
- Computer networks 9
- Security measures 9
- Application software 6
- Computer and Information Systems Applications 6
- Computer Communication Networks 5
- Computer networks 5
- Bilgisayar güvenliği 4
- Computer security 4
- Güvenlik önlemleri 4
- Automotive Engineering 3
- Automotive engineering 3
- Bioinformatics 3
- Computational and Systems Biology 3
- Data Structures and Information Theory 3
- Data structures (Computer science) 3
- Electric power production 3
- Electrical Power Engineering 3
- Güvenlik ölçütleri 3
- Information theory 3
Search alternatives:
- "network security" »
-
1
-
2
Network security essentials : applications and standards /
Published Pearson Education, 2014.Subjects: “…Computer networks Security measures. 1964…”
Book -
3
Cryptography and network security : principles and practice /
Published Pearson Education Limited, 2014.Subjects: “…Computer networks Security measures. 1964…”
Book -
4
Dynamic Games for Network Security
Published Springer International Publishing : Imprint: Springer, 2018.Full-text access
e-Book -
5
Computer and Network Security Essentials
Published Springer International Publishing : Imprint: Springer, 2018.Table of Contents: “…Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. NETWORK SECURITY -- Chapter 6.Malleable Cryptosystems and Their Applications in Wireless Sensor Networks -- Chapter 7. …”
Full-text access
e-Book -
6
Siber casusluk : siber casusluk yöntemleri ve karşı tedbirler/
Published Abaküs Kitap Yayın Dağıtım Hizmetleri, 2021.Subjects:Book -
7
-
8
IEEE transactions on information forensics and security
Published IEEE Signal Processing Society, 2006-Subjects: “…Computer networks Security measures Periodicals. 53925…”
Book -
9
-
10
Ulusal bilgi güvenliği : strateji ve kurumsal yapılanma: uzmanlık tezi /
Published T.C Kalkınma Bakanlığı, 2015.Subjects:Book -
11
High noon on the electronic frontier : conceptual issues in cyberspace /
Published MIT Press, 1996.Subjects:Book -
12
Security in Wireless Sensor Networks
Published Springer International Publishing : Imprint: Springer, 2016.Table of Contents: “…Introduction and Overview -- QoS as Means of Providing WSN Security -- Mathematical Model for Wireless Sensor Nodes Security -- Improved Feistel-based Ciphers for Wireless Sensor Network Security -- The Distributed Signature Scheme (DSS) Based on RSA -- Reliable Data Aggregation Protocol for Wireless Sensor Networks -- Conclusions and Future Work.…”
Full-text access
e-Book -
13
Smart Grids: Security and Privacy Issues
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Overview of the Security and Privacy Issues in Smart Grids -- I Physical Network Security -- Reliability in Smart Grids -- Error Detection of DC Power Flow using State Estimation -- Bad Data Detection -- II Information Network Security -- Cloud Network Data Security -- III Privacy Preservation -- End-User Data Privacy -- Mobile User Data Privacy.…”
Full-text access
e-Book -
14
Advances in Network Systems Architectures, Security, and Applications /
Published Springer International Publishing : Imprint: Springer, 2017.Table of Contents: “…Part I: Network Architectures -- Part II: Network Security -- Part III: Network Applications.…”
Full-text access
e-Book -
15
Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC - 16')
Published Springer International Publishing : Imprint: Springer, 2016.Table of Contents: “…Computer Security: Information security, Network Security, Cloud Security, Mobile Security -- Wireless Sensor Network -- Cloud Computing -- Image Processing -- Big Data -- Internet of Things -- Artificial Intelligence -- Software Engineering.…”
Full-text access
e-Book -
16
Dedicated Mobile Communications for High-speed Railway
Published Springer Berlin Heidelberg : Imprint: Springer, 2018.Table of Contents: “…Review of the Development of Dedicated Mobile Communications for High-Speed Railway -- Key Issues for GSM-R -- Radio Propagation and Wireless Channel for Railway Communications -- Cooperation and Cognition for Railway Communications -- Interference and Radio Resource Management in Mobile Communications for High-Speed Railway -- LTE-R Network -- Security of Dedicated Mobile Communications for Railway -- Channel Simulation Technologies for Railway Broad-Band Mobile Communication Systems -- Future Work and Challenges.…”
Full-text access
e-Book -
17
Introduction to Computer Networking
Published Springer International Publishing : Imprint: Springer, 2017.Full-text access
e-Book -
18
Smart Computing and Informatics Proceedings of the First International Conference on SCI 2016, Volume 1 /
Published Springer Nature Singapore : Imprint: Springer, 2018.Full-text access
e-Book -
19
Complexity in international security : a holistic spatial approach /
Published Emerald Publishing Limited, 2019.Table of Contents: “…Security related management examples under SGT -- Chapter 6. Networked security related solutions -- Chapter 7. Managing security by spatial control of moving objects -- Chapter 8. …”
Full-text access
e-Book -
20
Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Full-text access
e-Book