Persempit Pencarian
Topik
6
Ad Hoc and Sensor Network Security
6
Cryptographic protocols
6
Database and System Security
6
E-mail fraud
6
E-mail security
6
Internet Security & Applications
more ...
6
Intrusion Detection and Prevention
6
Mobile
6
Network and Wireless Network Security
6
Peer-to-Peer Network Security
Performance Evaluations of Protocols & Security Application
6
Phishing
6
Security & Network Management
6
Spam
6
Virus
6
Web 2.0 security
6
worms
5
Ubiquitous Computing Security
4
Trojan Protection
2
)
2
MiM
2
Replay attack etc
2
Security threats & countermeasures
2
Security threats & countermeasures (DDoS
2
Session Hijacking
2
Trojon Protection
2
• Cryptographic protocols
2
• Database and System Security
2
• Internet Security & Applications
2
• Intrusion Detection and Prevention
2
• Mobile
2
• Network and Wireless Network Security
2
• Peer-to-Peer Network Security
2
• Web 2.0 security
less ...
Pengarang
4
IJNSA
1
A.F. Al Azzawi
1
AIRCC
1
Ahmad Bany Doumi
1
B.Maheswara Rao
1
Chaker Abdelaziz Kerrache
more ...
1
Ezedin Barka
1
Hadjer Benkraouda
1
Ireneusz Jozwiak
1
Michal Kedziora
1
Michal Szczepanik
1
Mohammad Qatawneh
1
Paulina Gawin
1
Rajinder Singh
1
S.Baskar
1
Satish Kumar
1
khaled Shuaib
less ...
Bahasa