„network data security“
Suchergebnisse
2.555 Treffer
-
Security-Aware Device-to-Device Communications Underlaying Cellular Networks
-
Advanced Computing and Systems for Security – Volume 2
-
Algorithms and Architectures for Parallel Processing – 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18–20, 2015, Proceedings, Part I
-
Advanced Computing and Systems for Security – Volume 1
-
DCNN: a novel binary and multi-class network intrusion detection model via deep convolutional neural network
-
Handbook of Digital Forensics of Multimedia Data and Devices, Enhanced E-Book
-
Cyber-Physical Attack Recovery Procedures – A Step-by-Step Preparation and Response Guide
-
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
-
Security in Network Coding
-
Recent Advances in Systems Safety and Security
-
VoIP and PBX Security and Forensics – A Practical Approach
-
Moving Target Defense for Distributed Systems
-
Mobile Phone Security and Forensics – A Practical Approach
-
Handbook of Digital Forensics of Multimedia Data and Devices
-
The Accidental SysAdmin Handbook – A Primer for Entry Level IT Professionals
-
Emerging Trends in Computing and Communication – ETCC 2014, March 22-23, 2014
-
Algorithms and Architectures for Parallel Processing – 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18–20, 2015, Proceedings, Part II
-
Algorithms and Architectures for Parallel Processing – 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18–20, 2015. Proceedings, Part III
-
Algorithms and Architectures for Parallel Processing – 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18–20, 2015. Proceedings, Part IV
-
Proceedings of International Conference on Computer Science and Information Technology – CSAIT 2013, September 21–23, 2013, Kunming, China