Digitale Bibliotheek
Sluiten
Bladeren door artikelen uit een tijdschrift
Zoeken naar
Tijdschrift
Artikel
ISSN
NBN artikel
NBN tijdschrift
DARE/NARCIS document
met titel:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Tijdschrift beschrijving
Alle jaargangen van het bijbehorende tijdschrift
Alle afleveringen van het bijbehorende jaargang
Alle artikelen van de bijbehorende aflevering
20 gevonden resultaten
nr
titel
auteur
tijdschrift
jaar
jaarg.
afl.
pagina('s)
type
1
A Comparison between Memetic algorithm and Genetic algorithm for the cryptanalysis of Simplified Data Encryption Standard algorithm
Poonam Garg
2009
1
p. 34-42
artikel
2
Advanced Security Management in Metro Ethernet Networks
Ammar Rayes
2010
1
p. 65-80
artikel
3
A Frame Work for Ontological Privacy Preserved Mining
Geetha Mary. A
2010
1
p. 09-20
artikel
4
A Human-Centric Approach To Group-Based Context-Awareness
Nasser Ghadiri
2011
1
p. 47-66
artikel
5
Analysis of Web Logs And Web User In Web Mining
L.K. Joshila Grace
2011
1
p. 99-110
artikel
6
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS
Debdutta Barman Roy
2009
1
p. 44-52
artikel
7
An Overview Of The Security Concerns In Enterprise Cloud Computing
Anthony Bisong
2011
1
p. 30-45
artikel
8
COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION
Syed S. Rizvi
2010
1
p. 82-96
artikel
9
COMPARISON PROCESS LONG EXECUTION BETWEEN PQ ALGORTHM AND NEW FUZZY LOGIC ALGORITHM FOR VOIP
Suardinata
2011
1
p. 17-28
artikel
10
DYNAMIC NEURAL NETWORKS IN THE DETECTION OF DISTRIBUTED ATTACKS IN MOBILE AD-HOC NETWORKS
James Cannady
2010
1
p. 01-07
artikel
11
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Krishnamurthy G N
2009
1
p. 28-33
artikel
12
Failure of A Mix Network
Kun Peng
2011
1
p. 81-97
artikel
13
PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES
Wassim Itani
2010
1
p. 98-115
artikel
14
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA
Natarajan Meghanathan
2010
1
p. 43-55
artikel
15
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
Natarajan Meghanathan
2009
1
p. 14-25
artikel
16
USING ROUGH SET AND SUPPORT VECTOR MACHINE FOR NETWORK INTRUSION DETECTION
Rung-Ching Chen
2009
1
p. 01-13
artikel
17
Virtual Machines And Networks - Installation, Performance, Study, Advantages And Virtualization Options
Ishtiaq Ali
2011
1
p. 1-15
artikel
18
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
Omessaad Hamdi
2010
1
p. 57-63
artikel
19
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector
Iwendi, C. O.
2011
1
p. 68-79
artikel
20
WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS
Yan Luo
2010
1
p. 22-41
artikel
20 gevonden resultaten
Koninklijke Bibliotheek -
Nationale Bibliotheek van Nederland