Статті в журналах з теми "Secure Networks"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secure Networks".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Elaine Shi and A. Perrig. "Designing Secure Sensor Networks." IEEE Wireless Communications 11, no. 6 (2004): 38–43. http://dx.doi.org/10.1109/mwc.2004.1368895.
Повний текст джерелаZhan, Justin. "Secure Collaborative Social Networks." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 40, no. 6 (2010): 682–89. http://dx.doi.org/10.1109/tsmcc.2010.2050879.
Повний текст джерелаBreeding, Marshall. "Designing secure library networks." Library Hi Tech 15, no. 1/2 (1997): 11–20. http://dx.doi.org/10.1108/07378839710306945.
Повний текст джерелаKotzanikolaou, Panayiotis, Roza Mavropodi, Christos Douligeris, and Vassilios Chrissikopoulos. "Secure distributed intelligent networks." Computer Communications 29, no. 3 (2006): 325–36. http://dx.doi.org/10.1016/j.comcom.2004.12.012.
Повний текст джерелаMaivizhi, Radhakrishnan, and Palanichamy Yogesh. "Secure In-Network Aggregation in Wireless Sensor Networks." International Journal of Intelligent Information Technologies 16, no. 1 (2020): 49–74. http://dx.doi.org/10.4018/ijiit.2020010104.
Повний текст джерелаShang, Tao, Jiao Li, and Jian-wei Liu. "Secure quantum network coding for controlled repeater networks." Quantum Information Processing 15, no. 7 (2016): 2937–53. http://dx.doi.org/10.1007/s11128-016-1323-y.
Повний текст джерелаTamaddon, Sohail, Atif Ahmad, and Rachelle Bosua. "Secure Knowledge Management." International Journal of Cyber Warfare and Terrorism 5, no. 2 (2015): 1–20. http://dx.doi.org/10.4018/ijcwt.2015040101.
Повний текст джерелаvon Solms, Basie, and Emil Marais. "From secure wired networks to secure wireless networks – what are the extra risks?" Computers & Security 23, no. 8 (2004): 633–37. http://dx.doi.org/10.1016/j.cose.2004.09.005.
Повний текст джерелаAl-Fayyadh, Hayder. "ENHANCING QUALITY OF SERVICE IN MANET ENVIRONMENTS WITH CRYPTOGRAPHIC SECURE MECHANISMS TO SECURE SUSTAINABLE SMART CITIES." Journal of Engineering, Management and Information Technology 2, no. 4 (2024): 169–76. http://dx.doi.org/10.61552/jemit.2024.04.001.
Повний текст джерелаSadineni, Mr Giribabu, Janardhan Reddy D, B. Uma Pavani, K. Vijaya Lakshmi, Sk Karishma, and P. Tulasi. "Secure Aggregation of Data in Connection-Less Networks." International Journal of Innovative Research in Computer Science and Technology 11, no. 3 (2023): 85–89. http://dx.doi.org/10.55524/ijircst.2023.11.3.16.
Повний текст джерелаCapkun, S., and J. P. Hubaux. "Secure positioning in wireless networks." IEEE Journal on Selected Areas in Communications 24, no. 2 (2006): 221–32. http://dx.doi.org/10.1109/jsac.2005.861380.
Повний текст джерелаTseung, L. C. N. "Guaranteed, reliable, secure broadcast networks." IEEE Network 3, no. 6 (1989): 33–37. http://dx.doi.org/10.1109/65.39134.
Повний текст джерелаSun, Hung-Min, and Shiuh-Pyng Shieh. "Secure broadcasting in large networks." Computer Communications 21, no. 3 (1998): 279–83. http://dx.doi.org/10.1016/s0140-3664(97)00187-4.
Повний текст джерелаStevenson, Daniel, Nathan Hillery, and Greg Byrd. "Secure communications in ATM networks." Communications of the ACM 38, no. 2 (1995): 45–52. http://dx.doi.org/10.1145/204826.204844.
Повний текст джерелаMitchell, Chris J., and Fred C. Piper. "Key storage in secure networks." Discrete Applied Mathematics 21, no. 3 (1988): 215–28. http://dx.doi.org/10.1016/0166-218x(88)90068-6.
Повний текст джерелаChithra, M. R., and Manju K. Menon. "Secure domination of honeycomb networks." Journal of Combinatorial Optimization 40, no. 1 (2020): 98–109. http://dx.doi.org/10.1007/s10878-020-00570-8.
Повний текст джерелаSabnis, Suhasini, Marc Verbruggen, John Hickey, and Alan J. McBride. "Intrinsically Secure Next-Generation Networks." Bell Labs Technical Journal 17, no. 3 (2012): 17–36. http://dx.doi.org/10.1002/bltj.21556.
Повний текст джерелаEl Rouayheb, Salim, Emina Soljanin, and Alex Sprintson. "Secure Network Coding for Wiretap Networks of Type II." IEEE Transactions on Information Theory 58, no. 3 (2012): 1361–71. http://dx.doi.org/10.1109/tit.2011.2173631.
Повний текст джерелаMishra, Shailendra. "SDN-Based Secure Architecture for IoT." International Journal of Knowledge and Systems Science 11, no. 4 (2020): 1–16. http://dx.doi.org/10.4018/ijkss.2020100101.
Повний текст джерелаKulkumatagi, Savita S. "Secure Data Retrieval for Decentralized Disruption-Tolerent Military Networks." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (2016): 223–29. http://dx.doi.org/10.9756/bijsesc.8283.
Повний текст джерелаGuyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.
Повний текст джерелаGoldberg, Sharon, Michael Schapira, Pete Hummon, and Jennifer Rexford. "How secure are secure interdomain routing protocols?" Computer Networks 70 (September 2014): 260–87. http://dx.doi.org/10.1016/j.comnet.2014.05.007.
Повний текст джерелаJayabalan, E., and R. Pugazendi. "Generative Adversarial Networks for Secure Data Transmission in Wireless Network." Intelligent Automation & Soft Computing 35, no. 3 (2023): 3757–84. http://dx.doi.org/10.32604/iasc.2023.031200.
Повний текст джерелаWehbi, Rania, Ayman Kayssi, Ali Chehab, and Zaher Dawy. "Network Setup for Secure Routing in Inter-Vehicle Communication Networks." International Journal of Business Data Communications and Networking 2, no. 4 (2006): 1–17. http://dx.doi.org/10.4018/jbdcn.2006100101.
Повний текст джерелаHe, Hongliang, Shanxiang Lyu, Qinghao He, and Dongyang Xu. "Network Coding Assisted Secure Transmission in Full-Duplex Relay Networks." IEEE Transactions on Vehicular Technology 69, no. 8 (2020): 9196–200. http://dx.doi.org/10.1109/tvt.2020.3001871.
Повний текст джерелаNuñez Alvarez, José R., Yelena Pérez Zamora, Israel Benítez Pina, and Eliana Noriega Angarita. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611. http://dx.doi.org/10.11591/ijece.v11i1.pp611-619.
Повний текст джерелаJoy, Joshua, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou, and Mario Gerla. "DiscoverFriends: secure social network communication in mobile ad hoc networks." Wireless Communications and Mobile Computing 16, no. 11 (2016): 1401–13. http://dx.doi.org/10.1002/wcm.2708.
Повний текст джерелаJosé, R. Nuñez Alvarez, Pérez Zamora Yelena, Benítez Pina Israel, and Noriega Angarita Eliana. "Demilitarized network to secure the data stored in industrial networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 1 (2021): 611–19. https://doi.org/10.11591/ijece.v11i1.pp611-619.
Повний текст джерелаToral-Cruz, Homero, Debiao He, Albena D. Mihovska, Kim-Kwang Raymond Choo, and Muhammad Khurram Khan. "Reliable and Secure e-Health Networks." Wireless Personal Communications 117, no. 1 (2021): 1–6. http://dx.doi.org/10.1007/s11277-021-08104-z.
Повний текст джерелаSingh, Vikram, and Jaspal Ramola. "Secure Communications Over Wireless Broadcast Networks." Journal of Advance Research in Electrical & Electronics Engineering (ISSN: 2208-2395) 1, no. 4 (2014): 01–05. http://dx.doi.org/10.53555/nneee.v1i4.244.
Повний текст джерелаDalskov, Anders, Daniel Escudero, and Marcel Keller. "Secure Evaluation of Quantized Neural Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 355–75. http://dx.doi.org/10.2478/popets-2020-0077.
Повний текст джерелаQi, Yue, and Mojtaba Vaezi. "Secure Transmission in MIMO-NOMA Networks." IEEE Communications Letters 24, no. 12 (2020): 2696–700. http://dx.doi.org/10.1109/lcomm.2020.3016999.
Повний текст джерелаLi, Bin, Zesong Fei, Yan Zhang, and Mohsen Guizani. "Secure UAV Communication Networks over 5G." IEEE Wireless Communications 26, no. 5 (2019): 114–20. http://dx.doi.org/10.1109/mwc.2019.1800458.
Повний текст джерелаDietzel, Stefan, Elmar Schoch, Bastian Konings, Michael Weber, and Frank Kargl. "Resilient secure aggregation for vehicular networks." IEEE Network 24, no. 1 (2010): 26–31. http://dx.doi.org/10.1109/mnet.2010.5395780.
Повний текст джерелаBrennan, Rob, Kevin Feeney, Yuqian Song, and Declan O'Sullivan. "Secure federated monitoring of heterogeneous networks." IEEE Communications Magazine 51, no. 11 (2013): 63–71. http://dx.doi.org/10.1109/mcom.2013.6658654.
Повний текст джерелаKang, Jiawen, Rong Yu, Sabita Maharjan, et al. "Toward secure energy harvesting cooperative networks." IEEE Communications Magazine 53, no. 8 (2015): 114–21. http://dx.doi.org/10.1109/mcom.2015.7180517.
Повний текст джерелаKim, Sung-Il, Il-Min Kim, and Jun Heo. "Secure Transmission for Multiuser Relay Networks." IEEE Transactions on Wireless Communications 14, no. 7 (2015): 3724–37. http://dx.doi.org/10.1109/twc.2015.2410776.
Повний текст джерелаWilliamson, J. "Review: Authentication Systems for Secure Networks." Computer Bulletin 39, no. 1 (1997): 27. http://dx.doi.org/10.1093/combul/39.1.27-a.
Повний текст джерелаCurtmola, Reza, and Cristina Nita-Rotaru. "Secure multicast routing in wireless networks." ACM SIGMOBILE Mobile Computing and Communications Review 11, no. 2 (2007): 55–56. http://dx.doi.org/10.1145/1282221.1282233.
Повний текст джерелаChi-Chun Lo and Yu-Jen Chen. "Secure communication mechanisms for GSM networks." IEEE Transactions on Consumer Electronics 45, no. 4 (1999): 1074–80. http://dx.doi.org/10.1109/30.809184.
Повний текст джерелаByres, E. J. "Designing secure networks for process control." IEEE Industry Applications Magazine 6, no. 5 (2000): 33–39. http://dx.doi.org/10.1109/2943.863633.
Повний текст джерелаGaneriwal, Saurabh, Christina Pöpper, Srdjan Čapkun, and Mani B. Srivastava. "Secure Time Synchronization in Sensor Networks." ACM Transactions on Information and System Security 11, no. 4 (2008): 1–35. http://dx.doi.org/10.1145/1380564.1380571.
Повний текст джерелаVon Solms, Basic. "Managing secure computer systems and networks." International Journal of Bio-Medical Computing 43, no. 1-2 (1996): 47–52. http://dx.doi.org/10.1016/s0020-7101(96)01226-3.
Повний текст джерелаCosta, Gabriele, Pierpaolo Degano, and Fabio Martinelli. "Secure service orchestration in open networks." Journal of Systems Architecture 57, no. 3 (2011): 231–39. http://dx.doi.org/10.1016/j.sysarc.2010.09.001.
Повний текст джерелаAvancha, Sasikanth, Jeffrey Undercoffer, Anupam Joshi, and John Pinkston. "Secure sensor networks for perimeter protection." Computer Networks 43, no. 4 (2003): 421–35. http://dx.doi.org/10.1016/s1389-1286(03)00352-9.
Повний текст джерелаChoudhury, Ashish, Arpita Patra, B. V. Ashwinkumar, Kannan Srinathan, and C. Pandu Rangan. "Secure message transmission in asynchronous networks." Journal of Parallel and Distributed Computing 71, no. 8 (2011): 1067–74. http://dx.doi.org/10.1016/j.jpdc.2011.03.004.
Повний текст джерелаAkhunzada, Adnan, Abdullah Gani, Nor Badrul Anuar, et al. "Secure and dependable software defined networks." Journal of Network and Computer Applications 61 (February 2016): 199–221. http://dx.doi.org/10.1016/j.jnca.2015.11.012.
Повний текст джерелаde la Piedra, Antonio, An Braeken, Abdellah Touhafi, and Karel Wouters. "Secure event logging in sensor networks." Computers & Mathematics with Applications 65, no. 5 (2013): 762–73. http://dx.doi.org/10.1016/j.camwa.2012.06.019.
Повний текст джерелаDyer, Martin, Trevor Fenner, Alan Frieze, and Andrew Thomason. "On key storage in secure networks." Journal of Cryptology 8, no. 4 (1995): 189–200. http://dx.doi.org/10.1007/bf00191355.
Повний текст джерелаRömmele, Stefan. "Automated Driving Calls for Secure Networks." ATZelektronik worldwide 10, no. 2 (2015): 12–17. http://dx.doi.org/10.1007/s38314-015-0517-x.
Повний текст джерела