Current Search:  Computer networks -- Security measures (x)

View All Items

  • CSV Spreadsheet
(1 - 20 of 37)

Pages

Properties of Static and Mobile Unreliable Networks and their effects on Combating Malicious Objects
utility-based routing scheme in multi-hop wireless networks
Design and analysis of key establishment protocols
Data mining heuristic-¬based malware detection for android applications
Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study
Unifying the conceptual levels of network security through the use of patterns
Reputation-based system for encouraging cooperation of nodes in mobile ad hoc networks
An Empirical Study of Ordinal and Non-ordinal Classification Algorithms for Intrusion Detection in WLANs
Evaluating indirect and direct classification techniques for network intrusion detection
Misuse Patterns for the SSL/TLS Protocol
Resource-sensitive intrusion detection models for network traffic
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
Fuzzy vault fingerprint cryptography: Experimental and simulation studies
Web-based wireless sensor network monitoring using smartphones
Secure routing in wireless sensor networks
Security in voice over IP networks
comparative study of classification algorithms for network intrusion detection
Firewall formulation driven by risk analysis
Intrusion detection in wireless networks: A data mining approach
Machine learning algorithms for the analysis and detection of network attacks

Pages