-
1
-
2
-
3Subjects: “...benefits -electronic banking - mobile banking - network security - threats...”
Get access
Master Thesis -
4by Zhang, Xueying, 1979-Subjects: “...Wireless sensor networks--Security measures...”
Published 2010
Get access
Thesis -
5by Jordan, Jr , Louis H, Metz, Steven, Howell, Robert J, Connelly, David, Melody, Jeff, Surdu, John, Brischke, Karla, Cranz, Donald, Gailliard, John, Proctor, Brian CSubjects: “...COMPUTER NETWORK SECURITY...”
Published 2012
Get access
Get access
Text -
6by Svendsen, Gaute“...This thesis was written to promote awareness of wireless network security to the ICT industry...”
Published 2012
Get access
Master Thesis -
7“... policies, information flow, security experiences, Web security, and network security....”
Get access
Get access
-
8“... privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses...”
Get access
Get access
Other/Unknown Material -
9by Conrad, Marcus“...• Suggestions and discussion about changes/improvements of the network.• Open Wi-Fi and network security...”
Published 2015
Get access
Bachelor Thesis -
10
-
11by Starý, Jan“... circumstances, what means exist in the field of network security and if adopted measures to increase security...”
Published 2015
Get access
Thesis -
12by Starý, Jan“... circumstances, what means exist in the field of network security and if adopted measures to increase security...”
Published 2015
Get access
Thesis -
13“... regression (VTR) on two IDS network datasets: Bot-IoT and network security lab-knowledge discovery and data...”
Get access
Get access
Article in Journal/Newspaper -
14“... Journal of Computer Science and Network Security, March 2011: VOL.11 No.3.\n[12]\tM. Blank, L. Gorelick, E...”
Get access
Get access
Text -
15“... Journal of Computer Science and Network Security, March 2011: VOL.11 No.3.\n[12]\tM. Blank, L. Gorelick, E...”
Get access
Get access
Text -
16“... Using ACO\", International Journal of Computer Science and Network Security, Volume:12, Issue :5, Page...”
Get access
Get access
Text -
17“... Using ACO\", International Journal of Computer Science and Network Security, Volume:12, Issue :5, Page...”
Get access
Get access
Text -
18by Rosi, Katja“... network security, devices or user data. These incidents can be prevented only with adequate protection...”
Published 2017
Get access
Get access
Get access
Master Thesis -
19“... economic and political. From climate change to a progressive economic integration to global networks...”
Get access
Get access
Article in Journal/Newspaper -
20“... economic and political. From climate change to a progressive economic integration to global networks...”
Get access
Get access
Article in Journal/Newspaper