Persempit Pencarian
Hapus Filter
Topik: Ubiquitous Computing Security
Topik
5
Ad Hoc and Sensor Network Security
5
Cryptographic protocols
5
Database and System Security
5
E-mail fraud
5
E-mail security
5
Internet Security & Applications
more ...
5
Intrusion Detection and Prevention
5
Mobile
5
Network and Wireless Network Security
5
Peer-to-Peer Network Security
5
Performance Evaluations of Protocols & Security Application
5
Phishing
5
Security & Network Management
5
Spam
Ubiquitous Computing Security
5
Virus
5
Web 2.0 security
5
worms
3
Trojan Protection
2
)
2
MiM
2
Replay attack etc
2
Security threats & countermeasures
2
Security threats & countermeasures (DDoS
2
Session Hijacking
2
Trojon Protection
2
• Cryptographic protocols
2
• Database and System Security
2
• Internet Security & Applications
2
• Intrusion Detection and Prevention
2
• Mobile
2
• Network and Wireless Network Security
2
• Peer-to-Peer Network Security
2
• Web 2.0 security
less ...
Pengarang
3
IJNSA
1
A.F. Al Azzawi
1
AIRCC
1
Ahmad Bany Doumi
1
B.Maheswara Rao
1
Chaker Abdelaziz Kerrache
more ...
1
Ezedin Barka
1
Hadjer Benkraouda
1
Ireneusz Jozwiak
1
Michal Kedziora
1
Michal Szczepanik
1
Mohammad Qatawneh
1
Paulina Gawin
1
Rajinder Singh
1
S.Baskar
1
Satish Kumar
1
khaled Shuaib
less ...
Bahasa