Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
communication documentation » communication foundation, communication conversation
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
communication documentation » communication foundation, communication conversation
based dimensions » based dimension, basic dimensions, based dimensioning
dimensions data » dimension data, dimensional data, dimensions dark
data attacks » dpa attacks, day attacks, ddos attacks
1
Published 2015
Table of Contents:
“... Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Location based Coordinated...”View full text
Electronic
eBook
2
Published 2015
Table of Contents:
“... using a Graph based Approach to Implicitly Find Influential Users -- Ensuring Data Security...”View full text
Electronic
eBook
3
Published 2013
Table of Contents:
“...Adhoc and Sensor Networks -- Perspectives of Sybil Attack in Routing Protocols of Mobile Ad Hoc...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Wireless Communication -- A Novel Frequency Drift Tracking Algorithm Based on Kalman Filter in 60GHz mm...”View full text
Electronic
eBook
5
Published 2007
Table of Contents:
“... and Consolidation in Transport Logistics Based on Multi-agent Clustering -- Intelligent Agents for Real Time Data...”View full text
Electronic
eBook
6
Published 2015
Table of Contents:
“... Profiling -- Cyber Attribution: An Argumentation-Based Approach -- The Human Factor in Cybersecurity: Robust...”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“... Structure for Frequent Pattern Mining of Uncertain Data -- Frequent Pattern Mining in Attributed Trees...”View full text
Electronic
eBook
8
Published 2006
Table of Contents:
“... Communication -- Embodied Conversational Agents: Computing and Rendering Realistic Gaze Patterns -- DBN Based...”View full text
Electronic
eBook
9
Published 2007
Table of Contents:
“... and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver...”View full text
Electronic
eBook
10
Published 2006
Table of Contents:
“...-Goethals-Like Codes and Variants of Cyclotomic Polynomials -- Space-Time Code Designs Based...”View full text
Electronic
eBook
11
Published 2010
Table of Contents:
“... Computing -- Consistently Handling Geographical User Data -- Intelligent Databases -- A Model Based...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... with Reduced Dimension Using Data Mining Classification Methods and Their Performance Comparison -- Recognition...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... -- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks -- Protecting...”View full text
Electronic
eBook
14
Published 2010
Table of Contents:
“... and Multivariate Schemes -- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions...”View full text
Electronic
eBook
15
Published 2007
Table of Contents:
“... Networks Based on Learning Automata -- Fast and Effective Dimensioning Algorithm for End-to-End Optical...”View full text
Electronic
eBook
16
Published 2013
Table of Contents:
“... MATLAB -- Tumor Mass Identification Based on Surface Analysis and Fractal Dimensions -- Mean-Shift...”View full text
Electronic
eBook
17
Published 2005
Table of Contents:
“... Semantics from Dance Videos -- BioPubMiner: Machine Learning Component-Based Biomedical Information Analysis...”View full text
Electronic
eBook
18
Published 2012
Table of Contents:
“... -- Design of an Application-Dependent Static-Based Shared Memory Network -- Determining Quality of S-Boxes...”View full text
Electronic
eBook
19
Published 2012
Table of Contents:
“... Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor -- Parallel...”View full text
Electronic
eBook
20
Published 2008
Table of Contents:
“... for Source Camera Identification -- Data Recovery from Windows CE Based Handheld Devices -- Legal Issues...”View full text
Electronic
eBook



