Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm Poonam Garg
2009
1 p. 34-42
artikel
2 Advanced Security Management in Metro Ethernet Networks Ammar Rayes
2010
1 p. 65-80
artikel
3 A Frame Work for Ontological Privacy Preserved Mining Geetha Mary. A
2010
1 p. 09-20
artikel
4 A Human-Centric Approach To Group-Based Context-Awareness Nasser Ghadiri
2011
1 p. 47-66
artikel
5 Analysis of Web Logs And Web User In Web Mining L.K. Joshila Grace
2011
1 p. 99-110
artikel
6 A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS Debdutta Barman Roy
2009
1 p. 44-52
artikel
7 An Overview Of The Security Concerns In Enterprise Cloud Computing Anthony Bisong
2011
1 p. 30-45
artikel
8 COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION Syed S. Rizvi
2010
1 p. 82-96
artikel
9 COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALGORITHM FOR VOIP Suardinata
2011
1 p. 17-28
artikel
10 DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS James Cannady
2010
1 p. 01-07
artikel
11 Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images Krishnamurthy G N
2009
1 p. 28-33
artikel
12 Failure of A Mix Network Kun Peng
2011
1 p. 81-97
artikel
13 PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES Wassim Itani
2010
1 p. 98-115
artikel
14 STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA Natarajan Meghanathan
2010
1 p. 43-55
artikel
15 TOOLS AND TECHNIQUES FOR NETWORK FORENSICS Natarajan Meghanathan
2009
1 p. 14-25
artikel
16 USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION Rung-Ching Chen
2009
1 p. 01-13
artikel
17 Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options Ishtiaq Ali
2011
1 p. 1-15
artikel
18 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamdi
2010
1 p. 57-63
artikel
19 Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector Iwendi, C. O.
2011
1 p. 68-79
artikel
20 WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS Yan Luo
2010
1 p. 22-41
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland