Добірка наукової літератури з теми "Secure Networks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Secure Networks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Secure Networks"
Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.
Повний текст джерелаZhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.
Повний текст джерелаBreeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.
Повний текст джерелаKotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.
Повний текст джерелаMaivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.
Повний текст джерелаShang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.
Повний текст джерелаTamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.
Повний текст джерелаvon Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.
Повний текст джерелаAl-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.
Повний текст джерелаSadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.
Повний текст джерелаДисертації з теми "Secure Networks"
Tan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Повний текст джерелаYiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.
Повний текст джерелаPaul, Greig. "Secure decentralised storage networks." Thesis, University of Strathclyde, 2017. http://digitool.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=28763.
Повний текст джерелаHia, Henry Erik. "Secure SNMP-Based Network Management in Low Bandwidth Networks." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32126.
Повний текст джерелаLim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.
Повний текст джерелаBellardo, John Michael. "Secure and efficient wireless networks." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2006. http://wwwlib.umi.com/cr/ucsd/fullcit?p3220376.
Повний текст джерелаFriji, Hamdi. "Graph neural network-based intrusion detection for secure edge networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS030.
Повний текст джерелаNawaz, Omer. "Secure Identification in Social Wireless Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4042.
Повний текст джерелаMirzadeh, Shahab. "Secure key management for personal networks." Thesis, University of Surrey, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543916.
Повний текст джерелаMehta, Haripriya(Haripriya P. ). "Secure inference of quantized neural networks." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127663.
Повний текст джерелаКниги з теми "Secure Networks"
Preneel, Bart, ed. Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9.
Повний текст джерелаConti, Mauro. Secure Wireless Sensor Networks. Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4939-3460-7.
Повний текст джерелаJayakody, Dushantha Nalin K., Kathiravan Srinivasan, and Vishal Sharma, eds. 5G Enabled Secure Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03508-2.
Повний текст джерелаRaymond, Greenlaw, ed. Secure roaming in 802.11 networks. Newnes, 2007.
Знайти повний текст джерелаBukowski, Lech. Reliable, Secure and Resilient Logistics Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-00850-5.
Повний текст джерелаKhan, Jahanzeb. Building Secure Wireless Networks with 802.11. John Wiley & Sons, Ltd., 2003.
Знайти повний текст джерелаAnis, Khwaja, ed. Building secure wireless networks with 802.11. Wiley Pub., 2003.
Знайти повний текст джерелаLarry, Caffrey, Okot-Uma Rogers W'O, Commonwealth Secretariat, Commonwealth Network of Information Technology for Development., and International Council for Information Technology in Government Administration., eds. Government secure intranets. Commonwealth Secretariat, 1999.
Знайти повний текст джерелаVelliangiri, S., M. Gunasekaran, and P. Karthikeyan, eds. Secure Communication for 5G and IoT Networks. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-79766-9.
Повний текст джерелаЧастини книг з теми "Secure Networks"
Shen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Secure Routing." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_5.
Повний текст джерелаHicks, Michael, and Angelos D. Keromytis. "A Secure Plan." In Active Networks. Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48507-0_28.
Повний текст джерелаHerrigel, Alexander, and Xuejia Lai. "Secure IN internetworking." In Intelligent Networks. Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34894-0_11.
Повний текст джерелаLuo, Ming-Xing. "Secure Quantum Cloud Computing." In Quantum Networks. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-6226-2_7.
Повний текст джерелаShen, Yulong, Yuanyu Zhang, and Xiaohong Jiang. "Physical Layer Secure Communications." In Wireless Networks. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38465-3_2.
Повний текст джерелаKaranastasis, Stelios, and Ahmed Patel. "Security on ATM Networks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_1.
Повний текст джерелаMarkantonakis, Constantinos, and Simeon Xenitellis. "Implementing a Secure Log File Download Manager for the Java Card." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_10.
Повний текст джерелаOppliger, Rolf. "Protecting Key Exchange and Management Protocols Against Resource Clogging Attacks." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_11.
Повний текст джерелаAdamson, W. A., C. J. Antonelli, K. W. Coffman, P. McDaniel, and J. Rees. "Secure Distributed Virtual Conferencing." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_12.
Повний текст джерелаHardjono, Thomas, and Brad Cain. "PIM-SM Security: Interdomain Issues and Solutions." In Secure Information Networks. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35568-9_13.
Повний текст джерелаТези доповідей конференцій з теми "Secure Networks"
Mas Machuca, Carmen. "Planning Strategy Towards Secure Optical Core Networks." In Photonic Networks and Devices. Optica Publishing Group, 2024. https://doi.org/10.1364/networks.2024.nem1c.4.
Повний текст джерелаSulimany, Kfir, Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund. "Quantum-Secure Deep Learning in Optical Networks." In Optical Fiber Communication Conference. Optica Publishing Group, 2025. https://doi.org/10.1364/ofc.2025.m4e.6.
Повний текст джерелаRahman, Mohammad Saidur, Stephen DiAdamo, Miralem Mehic, and Charles Fleming. "Quantum Secure Anonymous Communication Networks." In 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, 2024. http://dx.doi.org/10.1109/qcnc62729.2024.00060.
Повний текст джерелаBolgouras, Vaios, Aristeidis Farao, and Christos Xenakis. "Roadmap to Secure 6G Networks." In 2024 IEEE 29th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, 2024. https://doi.org/10.1109/camad62243.2024.10942738.
Повний текст джерелаGharib, Dr Mohammed. "How to Secure Cooperative UAV Networks?" In 2024 5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory) (CPSAT). IEEE, 2024. http://dx.doi.org/10.1109/cpsat64082.2024.10745417.
Повний текст джерелаSanghani, Parth, Sharada Valiveti, and Gaurang Raval. "Secure Data Flow Between Trusted Networks." In 2024 9th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2024. https://doi.org/10.1109/icces63552.2024.10859796.
Повний текст джерелаFan-Yuan, Guan-Jie. "High-secure quantum communication and networks." In 2024 IEEE Opto-Electronics and Communications Conference (OECC). IEEE, 2024. https://doi.org/10.1109/oecc54135.2024.10975607.
Повний текст джерелаFioravanti, Camilla, Ernesto Del Prete, and Roberto Setola. "Secure Gossip Algorithm for Industrial Networks." In 2025 33rd Mediterranean Conference on Control and Automation (MED). IEEE, 2025. https://doi.org/10.1109/med64031.2025.11073443.
Повний текст джерелаBA, Usha, and Aruna S. "Secure Decentralized File Sharing." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872313.
Повний текст джерелаEllis, Todd. "Security As a Service for Rail Applications." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8027.
Повний текст джерелаЗвіти організацій з теми "Secure Networks"
Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Повний текст джерелаPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Повний текст джерелаRavishankar, Chinya V., Srikanth Krishnamurthy, Michalis Faloutsos, and Satish Tripathi. Secure Wireless Fault Tolerant Tunable Networks (SWIFT). Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada437661.
Повний текст джерелаPopkov, G. V. Algorithms for designing secure multiservice communication networks. Ailamazyan Program Systems Institute of Russian Academy of Sciences, 2023. http://dx.doi.org/10.12731/ofernio.2023.25165.
Повний текст джерелаClark, Paul C., Timothy E. Lavin, Cynthia E. Irvine, and David J. Shifflett. DNS and Multilevel Secure Networks: Architectures and Recommendations. Defense Technical Information Center, 2009. http://dx.doi.org/10.21236/ada498511.
Повний текст джерелаLiu, Donggang. Secure and Robust Clustering in Wireless Sensor Networks. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada500585.
Повний текст джерелаDatko, Joshua B. Supporting Secure, AD HOC Joins for Tactical Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada403488.
Повний текст джерелаPeterson, Larry, Randy Wang, and Vivek Pai. Building Secure and Reliable Networks Through Robust Resource Scheduling. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada436189.
Повний текст джерелаMeseguer, Jose, and Carolyn Talcott. Maude: A Wide Spectrum Language for Secure Active Networks. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada406892.
Повний текст джерелаAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Повний текст джерела