Skip to content
Toggle navigation
Tentang IOS
Join Us
Hubungi Kami
Organisasi Mitra
Akun Anda
Keluar
Masuk
Bahasa Indonesia
Bahasa Indonesia
English
Semua Kolom
Judul
Pengarang
Subject
Call Number
ISBN/ISSN
Tag
Cari
Lanjutan
Pengarang
IJNSA
Koleksi Nasional
Menampilkan
1
-
5
of
5
untuk pencarian:
'IJNSA'
, lama mencari: 0.11s
Daftar
Grid
Visual
Sortir
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
International Journal of Network Security & Its Applications (
IJNSA
)
Article
oleh
IJNSA
Terbitan:
2018
Daftar Isi:
';
“
...International Journal of Network Security & Its Applications (
IJNSA
) --- UGC...
”
Available online:
Get online
Favorit
Tersimpan di:
International Journal of Network Security & Its Applications (
IJNSA
)
Article
oleh
IJNSA
Terbitan:
2018
Daftar Isi:
';
“
...The International Journal of Network Security & Its Applications (
IJNSA
) is a bi monthly open...
”
Available online:
Get online
Favorit
Tersimpan di:
The International Journal of Network Security & Its Applications (
IJNSA
) - ERA, UGC Listed Journal
Article
oleh
IJNSA
Terbitan:
2018
Daftar Isi:
';
“
... Coding Ali F. Al-Azzawi1, Philadelphia University, Jordan http://aircconline.com/
ijnsa
/V10N6/10618
ijnsa
01...
”
Available online:
Get online
Favorit
Tersimpan di:
International Journal of Network Security & Its Applications (
IJNSA
) - Current Issue - May 2019, Volume 11, Number 3
Article
oleh
IJNSA
Terbitan:
2019
Daftar Isi:
';
“
...International Journal of Network Security & Its Applications (
IJNSA
) ISSN 0974 - 9330 (Online...
”
Available online:
Get online
Favorit
Tersimpan di:
International Journal of Network Security & Its Applications (
IJNSA
) - Current Issue: September 2019, Volume 11, Number 5
Article
oleh
IJNSA
Terbitan:
2019
Daftar Isi:
';
“
...The International Journal of Network Security & Its Applications (
IJNSA
) is a bi monthly open...
”
Available online:
Get online
Favorit
Tersimpan di:
Search Tools:
Get RSS Feed
—
Email this Search
—
Related Subjects
Ad Hoc and Sensor Network Security
Cryptographic protocols
Database and System Security
E-mail fraud
E-mail security
Internet Security & Applications
Intrusion Detection and Prevention
Mobile
Network and Wireless Network Security
Peer-to-Peer Network Security
Performance Evaluations of Protocols & Security Application
Phishing
Security & Network Management
Spam
Virus
Web 2.0 security
worms
Ubiquitous Computing Security
Security threats & countermeasures
Trojan Protection
Trojon Protection
• Cryptographic protocols
• Database and System Security
• Internet Security & Applications
• Intrusion Detection and Prevention
• Mobile
• Network and Wireless Network Security
• Peer-to-Peer Network Security
• Web 2.0 security
Ad Hoc and Sensor Network Security Peer-to-Peer Network Security
Network and Wireless Network Security Mobile
×
Loading...