<< مقالات لاتين فني مهندسي >>
<< بر اساس عنوان >>
1
Security in Ad Hoc Networks: A Location Based Impersonation Detection Method
2
Security in Ad Hoc Networks: an Extension of Dynamic Source Routing In Mobile Ad Hoc Networks
3
Security in Ad Hoc Networks: From Vulnerability to Risk Management
4
Security in ad-hoc sensor networks with pre-loaded Time Limited Memory Keys
5
Security in Advanced Optical Communication Networks
6
Security in agent-based automation systems
7
Security in all-optical networks: Failure and attack avoidance using self-organization
8
Security in All-Optical Networks: Self-Organization and Attack Avoidance
9
Security in an insecure WLAN network
10
Security in automation and control systems based on OPC techniques
11
Security in big data of medical records
12
Security in Building Automation Systems
13
Security in cellular MIMO interference networks with linear receivers
14
Security in CloneCloud for Mobile Cloud Computing
15
Security in cloud computing approaches and solutions
16
Security in cloud computing systems: A review of challenges and solutions for security in distributed computing environments
17
Security in Cloud-Based Cyber-Physical Systems
18
Security in Coding Phase of SDLC
19
Security in cognitive radio networks
20
Security in cognitive radio networks - a survey
21
Security in cognitive radio networks [Guest Editorial]
22
Security in cognitive radio networks: An example using the commercial IEEE 802.22 standard
23
Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security
24
Security in Cognitive Radio Networks: Threats and Mitigation
25
Security in computing, 3rd ed. [Book Review]
26
Security in Context: Analysis and Refinement of Software Architectures
27
Security in cooperative spatial multiplexing system with zero-forcing filtering
28
Security in current systems
29
Security in cyber-physical energy systems
30
Security in cyber-physical systems: Controller design against Known-Plaintext Attack
31
Security in cyberspace: Issues, challenges and suggestion
32
Security in D2D Communications: A Review
33
Security in data communication and privacy in conversations for underwater wireless networks using scrambled speech scheme
34
Security in data forwarding through elliptic curve cryptography in cloud
35
Security In Distributed Computing: Did You Lock The Door?
36
Security in distributed digital libraries: issues and challenges
37
Security in distributed storage systems by communicating a logarithmic number of bits
38
Security in distributed wireless sensor networks
39
Security in Drupal
40
Security in e-learning systems
41
Security in enterprise networking: A quick tour
42
Security in e-Science
43
Security in fixed and wireless networks - [Book Review]
44
Security in future mobile sensor networks issues and challenges
45
Security in Health Information Systems: An Exploratory Comparison of U.S. and Swiss Hospitals
46
Security in healthcare informatics: Design and implementation of a robust authentication and a hybrid access control mechanism
47
Security in Healthcare Information Systems
48
Security in high speed networks
49
Security in high-level network protocols
50
Security in information systems and software engineering
51
Security in innovative new operating systems
52
Security in integrated vetronics: Applying elliptic curve digital signature algorithm to a safety-critical network protocol-TTP/C
53
Security in IP satellite networks: COMSEC and TRANSEC integration aspects
54
Security in IPv6-based wireless sensor network — Precision agriculture example
55
Security In Keykos™
56
Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland
57
Security in locally repairable storage
58
Security in MANET routing tables with FMNK cryptography model
59
Security in medical image communication with arnold´s cat map method and reversible watermarking
60
Security in military/commercial communication gateways
61
Security in MIMO wireless hybrid channel with artificial noise
62
Security in mobile ad hoc and sensor networks: part I [Guest Editorial]
63
Security in mobile ad hoc and sensor networks: part II [guest editorial]
64
Security in Mobile Ad Hoc Networks
65
Security in mobile ad hoc networks: challenges and solutions
66
Security in Mobile Ad-Hoc Networks
67
Security in mobile agent systems
68
Security in Mobile agent systems with Locator mechanism
69
Security in mobile and cordless telecommunications
70
Security in Mobile Governmental Transactions
71
Security in mobile grid service
72
Security in mobile systems
73
Security in mobile wireless networks
74
Security in Model Driven Development: A Survey
75
Security in MPSoCs: A NoC Firewall and an Evaluation Framework
76
Security in multicast mobile ad-hoc networks
77
Security in Multicast Networks
78
Security in Multicast Routing in Ad Hoc Network
79
Security in multi-tenancy cloud
80
Security in nano communication: Challenges and open research issues
81
Security in networked building automation systems
82
Security in networks: A game-theoretic approach
83
Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support E-Learning Teams
84
Security in Open Source Web Content Management Systems
85
Security in open systems technology demonstrator programme
86
Security in OPERA Specification Based PLC Systems
87
Security in Operational Wireless Sensor Networks
88
Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement Compliance
89
Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent
90
Security in Pervasive Computing Calling for new Security Principles
91
Security in Pervasive Health Care Networks: Current R&D and Future Challenges
92
Security in Photonic Networks: Threats and Security Enhancement
93
Security in PMR systems
94
Security in QoS signaling systems for mobile ad hoc networks
95
Security in quantum computing using quantum key distribution protocols
96
Security in Quantum Networks as an Optimization Problem
97
Security in restructured energy systems
98
Security in RFID 2008 Organizing Committee
99
Security in SCADA systems: how to handle the growing menace to process automation
100
Security in sensor network based SCADA system for adaptive traffic signal operation
101
Security in sensor networks: industry trends, present and future research directions
102
Security in service-oriented vehicular networks
103
Security in Single-Input Single-Output Multiple-helpers Wireless Channel
104
Security in SOA and Web Services
105
Security in software architecture: a case study
106
Security in Software Defined Networks: A Survey
107
Security in software engineering requirement
108
Security in space information networks
109
Security in SRAM FPGAs
110
Security in stochastic control systems: Fundamental limitations and performance bounds
111
Security in storage [standards]
112
Security in Storage Management: The Standards Question
113
Security in storage: a call for participation
114
Security in Tele-Lab — Protecting an online virtual lab for security training
115
Security in the cloud based systems: Structure and breaches
116
Security in the cloud computing: A review
117
Security in the cloud: Understanding the risks of cloud-as-a-service
118
Security in the Firefox OS and Tizen Mobile Platforms
119
Security in the IEEE Mass Storage System Reference Model
120
Security in the Internet of Things through obfuscation and diversification
121
Security in the Internet of Things: A Review
122
Security in the large: is Java´s sandbox scalable?
123
Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIP
124
Security in the online e-learning environment
125
Security in the Spring name service
126
Security in the Telecommunications Information Networking Architecture-the CrySTINA approach
127
Security in the telephone network of the 90´s
128
Security in the Wild
129
Security in third-generation mobile systems
130
Security in transnational interoperable PPDR communications: Threats and requirements
131
Security in Twin-code framework
132
Security in Underwater Sensor Network
133
Security in User-Assisted Communications
134
Security in value added networks-security requirements for EDI
135
Security in vehicular ad hoc networks
136
Security in vehicular ad-hoc network with Identity-Based Cryptography approach: A survey
137
Security in virtual automation networks
138
Security in Virtual Machine Live Migration for KVM
139
Security in VoIP systems: towards the design and implementation of a reconfigurable test bed for real-time measurements
140
Security in wireless actor & sensor networks (WASN): towards a hierarchical re-keying design
141
Security in wireless handsets - a case study
142
Security in Wireless Mesh Networks: Challenges and Solutions
143
Security in wireless mobile ad hoc and sensor networks [Guest Editorial]
144
Security in Wireless Mobile Technology for Healthcare Systems
145
Security in wireless multimedia communications [Guest Editorial]
146
Security in wireless residential networks
147
Security in Wireless Sensor Networks
148
Security in wireless sensor networks
149
Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model
150
Security in Wireless sensor networks with public key techniques
151
Security in Wireless Sensor Networks: Issues and challanges
152
Security in wireless sensor networks: issues and challenges
153
Security in Wireless Sensor Networks: Key Management Module in EECBKM
154
Security in wireless systems
155
Security incident detection technique for multilevel intelligent control systems on railway transport in Russia
156
Security incident management in ground transportation system using UAVs
157
Security Incident Origin Discovery (SIOD): IP Transaction Tracking for Centralized Cyber Defense
158
Security information and event management in the cloud computing infrastructure
159
Security information factor based low probability of identification in distributed multiple-radar system
160
Security Information Flow Control Model and Method in MILS
161
Security Information Flow in Multidimensional Arrays
162
Security information sharing for smart grids: Developing the right data model
163
Security information sharing for the polish power system
164
Security information sharing platform over multiple services
165
Security infrastructure for commercial and military ports
166
Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services
167
Security infrastructure in open wireless sensor and cellular mobility architectures
168
Security Inopportunistic Networks
169
Security Inspection Scenarios – A Facet of Security
170
Security Instrument using Talker Identification and Microphone Arrays in Variable Noisy Environments
171
Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design Methodology
172
Security interface between Metrica and Magerit: development of secure information systems
173
Security inter-layering for evolving and future network architectures
174
Security intrusion process: an empirical model
175
Security investigation and enhancement of IKEV2 protocol
176
Security investment games of interdependent organizations
177
Security Is a Subset of Reliability
178
Security is partitioned dynamic stastical databases
179
Security is the key
180
Security Issue For Space Internet
181
Security issues affecting C3I systems
182
Security issues and Ada runtime support
183
Security issues and attack management in AON- A review
184
Security Issues and Challenges for Cyber Physical System
185
Security issues and challenges in cloud
186
Security issues and challenges of Vehicular Ad Hoc Networks (VANET)
187
Security issues and control mechanisms in Cloud
188
Security issues and countermeasures in cloud computing
189
Security issues and performance study of key management techniques over satellite links
190
Security Issues and Privacy Concerns in the Implementation of Wireless Body Area Network
191
Security issues and quality of service in real time wireless PLC/SCADA process control systems
192
Security issues and requirements for Internet-scale publish-subscribe systems
193
Security Issues and Solutions in Cloud Computing
194
Security issues and solutions in multicast content distribution: a survey
195
Security issues and solutions of WPA encrypted public wireless Local Area Network
196
Security issues and their solutions in MANET
197
Security issues and vulnerabilities in connected car systems
198
Security issues and vuluerabilities of the SNMP protocol
199
Security issues based on chaotic systems
200
Security issues concern for E-Learning by Saudi universities
201
Security issues due to reflection in PON physical medium
202
Security issues for data sharing and service interoperability in eHealth systems: The Nu.Sa. test bed
203
Security issues for downloaded code in mobile phones
204
Security issues for DTN mechanism of UIoT
205
Security issues for GRID systems
206
Security issues for Internet appliances
207
Security issues for Internet-based calibration activities
208
Security issues for the semantic Web
209
Security Issues for the Sensitive, but Unclassified, Community
210
Security issues for wireless ATM networks
211
Security issues for wireless ATM networks
212
Security issues in a CDPD wireless network
213
Security Issues in a Synchronous e-Training Platform
214
Security Issues in Ad-Hoc on Demand Distance Vector Routing (AODV) in Mobile Ad-Hoc Networks
215
Security Issues in All-Optical Networks
216
Security issues in all-optical networks
217
Security issues in an EDI environment
218
Security issues in biomedical wireless sensor networks
219
Security issues in biometric authentication
220
Security issues in cloud computing
221
Security issues in cloud computing
222
Security issues in computer networks and stegnography
223
Security Issues in Cooperative Communications: Tracing Adversarial Relays
224
Security Issues in Databases
225
Security Issues in Design and Development of High Performance Ubiquitous Computing
226
Security issues in digital audio watermarking
227
Security issues in e-government models: what governments should do ?
228
Security issues in emergency networks
229
Security issues in face recognition
230
Security issues in future mobile communications (Paper unavailable)
231
Security issues in grid environment
232
Security issues in High Level Architecture based distributed simulation
233
Security issues in high quality audio streaming
234
Security issues in hybrid networks with a satellite component
235
Security issues in ICT
236
Security issues in ICT
237
Security issues in information systems based on open-source technologies
238
Security Issues in Integrated EPON and Next-Generation WLAN Networks
239
Security issues in Internet commerce
240
Security issues in Internet protocols over satellite links
241
Security issues in IPv6
242
Security issues in MANET: A review
243
Security issues in mobile agent technology
244
Security issues in mobile communications
245
Security issues in mobile data networks
246
Security issues in mobile ecommerce
247
Security issues in National High Performance Computing Environment
248
Security issues in network virtualization for the future Internet
249
Security issues in networked appliances and home gateways
250
Security issues in networks with Internet access
251
Security Issues in NoSQL Databases
252
Security Issues in OCDMA with Multiple-User Aggregation
253
Security issues in on-demand grid and cluster computing
254
Security Issues in Online Social Networks
255
Security issues in optical networks physical layer
256
Security issues in peer-to-peer systems
257
Security issues in PIM-SM link-local messages
258
Security issues in policy routing
259
Security issues in research projects with patient´s medical data
260
Security issues in Sensor Networks and gathering admissible evidence in Network Forensics
261
Security issues in SIP signaling in wireless networks and services
262
Security Issues in Small World Network Routing
263
Security issues in smart metering systems
264
Security issues in the ABELS system for linking distributed simulations
265
Security issues in the development of a wireless blood-glucose monitoring system
266
Security issues in unified communications
267
Security issues in vehicular networks
268
Security issues in virtualization environment
269
Security Issues in VOIP Applications
270
Security issues in WAP WTLS protocol
271
Security Issues in Wireless Ad Hoc Networks and the Application to the Telecare Project
272
Security issues in wireless local area networks
273
Security Issues in Wireless Mesh Networks
274
Security Issues in Wireless Sensor Networks
275
Security Issues in WSNs with Cooperative Communication
276
Security Issues of a Biometrics Health Care Information System: The Case of the NHS
277
Security Issues of a Publicly Accessible Cloud Computing Infrastructure
278
Security issues of Biometric Encryption
279
Security issues of black hole attacks in MANET
280
Security Issues of Chen et al.´s Dynamic ID-Based Authentication Scheme
281
Security Issues of Collaborative Review System
282
Security issues of data query processing and location monitoring in MANETS
283
Security Issues of Distance Vector Routing Protocol and Its Advancement in Security
284
Security issues of emerging smart cards fare collection application in mass transit
285
Security issues of IPv6 communications in Cooperative Intelligent Transportation Systems (poster)
286
Security issues of m-commerce over hotspot networks
287
Security issues of power system interconnection
288
Security issues of service installation on a multi application NFC environment
289
Security issues of single sign on web services
290
Security issues of the combined usage of Grid and Cloud resources
291
Security issues of the IEEE 802.11b wireless LAN
292
Security issues of the Trusted Mach system
293
Security issues of topology discovery in wireless sensor networks
294
Security issues on B-ISDN billing system
295
Security issues on server-side credit-based electronic payment systems
296
Security issues on spectral-phase-encoded optical CDMA with phase-masking scheme
297
Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)
298
Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring
299
Security issues related to web services in e-commerce
300
Security issues relating to inadequate authentication in MapReduce applications
301
Security issues surrounding the use of open source software by online students
302
Security issues to tele-medicine system design
303
Security Kernel Design and Implementation: An Introduction
304
Security Kernels: A Solution or a Problem?
305
Security Key Designed for LAN and Mobile Terminal
306
Security layers and reliable communications towards green computing
307
Security Lessons Learned from Société Générale
308
Security level evaluation: policy and fuzzy techniques
309
Security Level Quantification and Benchmarking in Complex Networks
310
Security License Distribution Mechanism for Rights Delegation Models of Group Distribution between Consumers
311
Security limitations of an authorized anonymous ID-based scheme for mobile communication
312
Security Limits for Electromagnetic Radiation from CRT Displays
313
Security lock with DTMF polyphonic tone sensor
314
Security log time synchronization for high-availability systems
315
Security made easy: Achieving user-friendly communication protection in ad-hoc situations
316
Security management against cloned cellular telephones
317
Security management against cloning mobile phones
318
Security management architecture for access control to network resources
319
Security Management Areas in the Inter-cloud
320
Security management for ad-hoc networked resource-limited mobile devices
321
Security Management for Flexibility in Virtual Knowledge Spaces
322
Security management for large computer networks
323
Security Management for Mobile Devices by Face Recognition
324
Security management in hierarchical ad hoc network
325
Security management in Kerberos V5 for GSM network
326
Security Management in Personal Network
327
Security management in Wireless Sensor Networks
328
Security management interoperability challenges for Collaborative Clouds
329
Security management mechanism for composite applications based on hash chains
330
Security Management Model for Mobile Databases Transaction Management
331
Security Management Modeling in Collaborative Systems
332
Security Management of Authentication System Based on Dynamic Biometric Features
333
Security management of factory automation
334
Security management of Web services
335
Security management on mobile-phone communication
336
Security management pattern and strategy study of e-commerce
337
Security management process or video surveillance systems in heterogeneous communication networks
338
Security management spectrum in future multi-provider Inter-Cloud environments — Method to highlight necessary further development
339
Security Management System for Oilfield Based on Embedded Wireless Communication
340
Security Management System for Sensor Network
341
Security management system functional architecture for enterprise network
342
Security management under uncertainty: From day-ahead planning to intraday operation
343
Security management with scalable distributed IP traceback
344
Security Management with Virtual Gateway Platforms
345
Security margin increase by voltage stability-oriented emergency power injection
346
Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications?
347
Security measurement in service-based computing systems
348
Security Measurement Steps, Missteps, and Next Steps
349
Security Measures for Advanced Metering Infrastructure Components
350
Security measures for industrial fieldbus systems - state of the art and solutions for IP-based approaches
351
Security measures for the Austrian “PAYCHIP” electronic purse application
352
Security measures for the manufacture & control system
353
Security Measures in a Keyless Quantum Communication Protocol
354
Security Measures in a Secure Computer Communications Architecture
355
Security measures in automation systems-a practice-oriented approach
356
Security measures of manufacture & control system
357
Security mechanism analysis of open-source: Andriod OS & Symbian OS
358
Security mechanism for a wireless-sensor-networkbased healthcare monitoring system
359
Security mechanism for Android Cloud Computing
360
Security mechanism for C-Governance using Hadamard matrices
361
Security mechanism for distributed systems
362
Security mechanism for distribution automation using EPON
363
Security mechanism for IMS authentication, using public key techniques
364
Security mechanism for IPv6 router discovery based on distributed trust management
365
Security mechanism for IPv6 stateless address autoconfiguration
366
Security Mechanism for Multi-Domain Vehicle-to-Grid Infrastructure
367
Security mechanism for smart distribution grid using Ethernet Passive Optical Network
368
Security Mechanism for the Interactive Satellite Remote Education System Based on DTN
369
Security mechanism research of AVC in district sub-transmission network
370
Security Mechanism Research of EMV2000
371
Security Mechanism to Protect the Integrity of Web Documents
372
Security mechanisms Analysis of Wireless Sensor Networks specific Routing attacks
373
Security mechanisms and security analysis: hotspot WLANs and inter-operator roaming
374
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks
375
Security Mechanisms for a Cooperative Firewall
376
Security mechanisms for delivering ubiquitous services in next generation mobile networks
377
Security mechanisms for distributed information system in Industrial Technology Research Institute (ITRI)
378
Security mechanisms for legacy code applications in GT3 environment
379
Security mechanisms for SIP-based multimedia communication infrastructure
380
Security Mechanisms for the IPv4 to IPv6 Transition
381
Security mechanisms for the MAP agent system
382
Security mechanisms for using mobile agents in electronic commerce
383
Security mechanisms for wireless home network
384
Security mechanisms in converged networks
385
Security mechanisms in high-speed networks
386
Security Mechanisms in Network Protocols
387
Security mechanisms maintaining user profile in a personal area network
388
Security mechanisms to improve the availability of a Network-on-Chip
389
Security mechanisms to protect IEEE 1588 synchronization: State of the art and trends
390
Security mechanisms utilized in a secured cloud infrastructure
391
Security meta-services orchestration architecture
392
Security meter: a practical decision-tree model to quantify risk
393
Security method in distance-learning
394
Security methods for MP3 music delivery
395
Security methods for Web-based applications on embedded system
396
Security Methods for Wireless Sensor Networks
397
Security methods in fault tolerant modified line graph based networks
398
Security Metrics Based on Attack Graphs for the Olympic Games Scenario
399
Security Metrics for Object-Oriented Class Designs
400
Security Metrics for Object-Oriented Designs
401
Security metrics for risk assessment of distributed information systems
402
Security Metrics Models and Application with SVM in Information Security Management
403
Security metrics to improve misuse case model
404
Security metrics: A brief survey
405
Security middleware infrastructure for medical imaging system integration
406
Security model and authentication protocol in EPON-based optical access network
407
Security Model Based on Network Business Security
408
Security model consistency in secure object-oriented systems
409
Security model development environment
410
Security Model Evolution of PHP Web Applications
411
Security Model for a Multi-Agent Negotiate Protocol Based on Bit Commitment
412
Security Model for a Shared Multimedia Archive
413
Security Model for Certificateless Aggregate Signature Schemes
414
Security model for cloud database as a service (DBaaS)
415
Security Model for Distributed GIS Spatial Data
416
Security model for next generation collaborative working environments
417
Security model for real time tracking system (RTLS) in the healthcare sector
418
Security model for resource availability - subject and object type enforcement
419
Security model for routing attacks in mobile ad hoc networks
420
Security model for the protection of sensitive and confidential data on mobile devices
421
Security model for video surveillance system
422
Security model of communications in energy systems
423
Security Model of Group Message Transfer Using a Trigger
424
Security model of mobile online games
425
Security Model of Service Oriented Computational Grids
426
Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems
427
Security model research and design based on separate storage of keys
428
Security Model Research and Design of Embedded Trusted Terminal
429
Security Modeling and Analysis
430
Security modeling and analysis of a self-cleansing intrusion tolerance technique
431
Security modeling and analysis of an intrusion tolerant cloud data center
432
Security Modeling and Tool Support Advantages
433
Security modeling for power system reliability evaluation
434
Security modeling in the Ulysses environment
435
Security modeling of electronic commerce infrastructures
436
Security Modeling with BDMP: From Theory to Implementation
437
Security modelling
438
Security modelling along business process model of SOA systems using modified “UML-SOA-Sec”
439
Security modelling for e-Learning
440
Security modelling using hierarchical state machines
441
Security models and information flow
442
Security Models and Requirements for Healthcare Application Clouds
443
Security models for heterogeneous networking
444
Security models for priority buffering and interrupt handling
445
Security models for trusting network appliances
446
Security Models in the Password-Capability System
447
Security Models: Refocusing on the Human Factor
448
Security module analysis and implementation in TD-LTE/TD-SCDMA conformance test system
449
Security monitor for on-line dynamic security assessment
450
Security monitoring against voltage collapse through ant colony system
451
Security monitoring around a video surveillance car with a pair of two-camera omni-directional imaging devices
452
Security monitoring based on joint automatic speaker recognition and blind source separation
453
Security Monitoring by Watermarking and Hashing for Multimedia Service on Internet Platform
454
Security Monitoring in the Cloud: An SLA-Based Approach
455
Security Monitoring of Components Using Aspects and Contracts in Wrappers
456
Security Monitoring of HTTP Traffic Using Extended Flows
457
Security monitoring systems including fast transient stability studies
458
Security monitoring using microphone arrays and audio classification
459
Security Monitoring Using Wireless Sensor Networks
460
Security moving from database systems to ERP systems
461
Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry
462
Security notions for information theoretically secure encryptions
463
Security Objectives of Cyber Physical Systems
464
Security Objectives within a Security Testing Case Study
465
Security objectives, controls and metrics development for an Android smartphone application
466
Security of a new password authentication scheme using fuzzy extractor with Smart Card
467
Security of a one-time signature
468
Security of a Public Cloud
469
Security of access in hostile environments based on the history of nodes in ad hoc networks
470
Security of ad hoc networks and threshold cryptography
471
Security of AES Sbox designs to power analysis
472
Security of an ill-posed operator for image authentication
473
Security of an RFID Protocol for Supply Chains
474
Security of Applications Involving Multiple Organizations and Order Preserving Encryption in Hybrid Cloud Environments
475
Security of ATCS wireless railway communications
476
Security of audio secret sharing scheme encrypting audio secrets
477
Security of audio secret sharing scheme encrypting audio secrets with bounded shares
478
Security of Authenticated Encryption Scheme with Message Linkages
479
Security of authenticated multiple-key agreement protocols
480
Security of Autonomous Systems Employing Embedded Computing and Sensors
481
Security of autoregressive speech watermarking model under guessing attack
482
Security of B92 quantum cryptography against individual attack over realistic channel
483
Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting
484
Security of biometric authentication systems
485
Security of Biometrics Using Multimodal Approach
486
Security of broadcasting cryptosystem in computer networks
487
Security of Business to Business and Business to Customer Software Applications based on the Central Dogma of Molecular Biology (CDMB) and evolutionary models
488
Security of cass data hiding scheme under the scenarios of KMA and WOA
489
Security of Chien´s efficient time-bound hierarchical key assignment scheme
490
Security of C-ITS messages: A practical solution the ISE project demonstrator
491
Security of Classic PN-Spreading Codes for Hybrid DS/FH Spread-Spectrum Systems
492
Security of cloud computing system using object oriented technique
493
Security of cloud computing, storage, and networking
494
Security of Cloud Federation
495
Security of communications on a high availability mesh network applied in Smart Grids
496
Security of Compressing Encrypted Sources
497
Security of computer communication
498
Security of concatenated encoders for wiretap channels
499
Security of Copy-Control Watermarks
500
Security of copy-move forgery detection techniques
501
Security of critical control systems sparks concern
502
Security of current mobile IP solutions
503
Security of data transmission using logic gates and crypt analysis
504
Security of digital signature with one-time pair of keys [comment]
505
Security of Dispatching Management Information System in Power System
506
Security of distributed control systems: the concern increases
507
Security of distributed intrusion detection system based on multisensor fusion
508
Security of Distributed Processing of Medical Image Data Using JINI Technology
509
Security of Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack
510
Security of Dynamic ID-Based Remote User Authentication Scheme
511
Security of e-commerce technology and solutions
512
Security of Electricity Supply in Competitive Environment
513
Security of electronic health records based on Web services
514
Security of electronic ticketing
515
Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms
516
Security of end user wireless networks in Zagreb area
517
Security of Energy Supply With Change in Weather Conditions and Dynamic Thermal Limits
518
Security of Engineering Employment
519
Security of engineering employment
520
Security of entanglement based version of BB84 protocol for Quantum Cryptography
521
Security of Error Correcting Code for biometric Encryption
522
Security of feature extraction in image hashing
523
Security of File Backup Method in Computer System
524
Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks
525
Security of generalized signature scheme based on discrete logarithms and factorization
526
Security of GPT-like public-key cryptosystems based on linear rank codes
527
Security of Group Key Exchange Protocols with Different Passwords
528
Security of health imagery via reversible watermarking based on differential evolution
529
Security of huge data in the digital campus on the cloud computing mode
530
Security of ID-based key exchange scheme
531
Security of IEEE 802.16 in Mesh Mode
532
Security of image in multimedia applications
533
Security of Indirect-Authenticated Key Exchange Protocol
534
Security of Industrial Wireless Sensor Networks: A review
535
Security of interactive DSA batch verification
536
Security of Internet Banking Services and its Linkage with Users´ Trust: A Case Study of Parsian Bank of Iran and CIMB Bank of Malaysia
537
Security of Internet location management
538
Security of IoT systems: Design challenges and opportunities
539
Security of ISP Access Networks: Practical Experiments
540
Security of Knapsack PKC with Plaintext Encoding against Low-Density Attack
541
Security of Lattice-Based Data Hiding Against the Known Message Attack
542
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
543
Security of LBlock-s against related-key differential attack
544
Security of Levenshtein synchronization error correcting codes
545
Security of Li´s authentication and key agreement with smart card
546
Security of library information system under the network environment
547
Security of Message Passing Based on Grid Environment
548
Security of Mobile Agent-Based Web Applications
549
Security of Mobile and Heterogeneous Wireless Networks in Battlefields
550
Security of Mobile Communications
551
Security of mobile health (mHealth) systems
552
Security of mobile Internet access with UMTS/HSDPA/LTE
553
Security of mobile phones: Prevention methods for the spread of malware
554
Security of Multimedia services using WLAN access technology
555
Security of network element databases against increasing threats of intrusion via operations interfaces
556
Security of neural cryptography
557
Security of office management information system analysis
558
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited
559
Security of Okamoto public-key cryptosystem
560
Security of online reputation systems: The evolution of attacks and defenses
561
Security of ONS service for applications of the Internet of Things and their pilot implementation in academic network
562
Security of open source web applications
563
Security of Park-Lim key agreement schemes for VSAT satellite communications
564
Security of post-selection based continuous variable quantum key distribution against arbitrary attacks
565
Security of power line monitoring system based on wireless sensor network
566
Security of Power Plant Control Systems
567
Security of practical quantum key distribution system
568
Security of Present S-box
569
Security of privacy-preserving RFID systems
570
Security of private-key encryption based on array codes
571
Security of public key distribution in matrix rings
572
Security of public-key cryptosystems based on Chebyshev polynomials
573
Security of public-key cryptosystems based on Chebyshev polynomials over prime finite fields
574
Security of QKD with single particles in probabilistic cloning fashion
575
Security of quantum key distribution
576
Security of quantum key distribution with imperfect devices
577
Security of railway EOT systems
578
Security of RCL wireless railway communications
579
Security of real time cloud service providers: A survey
580
Security of registration data of fingerprint image with a server by use of the fractional Fourier transform
581
Security of RFID Systems - A Hybrid Approach
582
Security of robust audio hashes
583
Security of routing cache updates in cellular IP
584
Security of RSA-type cryptosystems over elliptic curves against Hastad attack
585
Security of Seismic Construction of High Voltage Switchgear
586
Security of Selected Future Internet Architectures: A Survey
587
Security of service requests for cloud based m-commerce
588
Security of Shallow-buried Oil-pipeline in the freeze-thaw processes of frost-soil bed in cold-region
589
Security of Shao´s signature schemes based on factoring and discrete logarithms
590
Security of sharded NoSQL databases: A comparative analysis
591
Security of Short Piles for High-Rise Building in Nanning
592
Security of SIP-based infrastructure against malicious message attacks
593
Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures
594
Security of SOA based on TPM
595
Security of SoC firmware load protocols
596
Security of statistical databases compromise through attribute correlational modeling
597
Security of supply implication of residential photovoltaic panels in low voltage network
598
Security of Supply in Planning and Operation of European Power Systems - Part I
599
Security of Supply in Planning and Operation of European Power Systems - Part II
600
Security of supply with dispersed integration of wind power in distribution networks
601
Security of Tax Management Information System
602
Security of the Cao-Li public key cryptosystem
603
Security of the food supply chain
604
Security of the GPT-Type Cryptosystems
605
Security of the Jan-Tseng integrated schemes for user authentication and access control
606
Security of the J-PAKE Password-Authenticated Key Exchange Protocol
607
Security of the Niderreiter Form of the GPT public-key cryptosystem
608
Security of the North American Telephone Network: past and present
609
Security of the power system based on the separation into islands
610
Security of the TCG Privacy-CA Solution
611
Security of TMN
612
Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes
613
Security of two remote user authentication schemes using smart cards
614
Security of two signature schemes based on two hard problems
615
Security of Tzeng´s time-bound key assignment scheme for access control in a hierarchy
616
Security of virtual networks in cloud computing for education
617
Security of virtual working on cloud computing platform
618
Security of Voip networks
619
Security of Web Applications with Short Web Service: A Review Study
620
Security of web forms
621
Security of Web Services
622
Security of Web services based service-oriented architectures
623
Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario
624
Security of wireless ATM networks
625
Security of Wireless Sensor Networks
626
Security of Xinmei digital signature scheme
627
Security of XML web services
628
Security of ZLYH-key authentication scheme
629
Security offload using the SmartNIC, A programmable 10 Gbps ethernet NIC
630
Security on cloud computing, query computation and data mining on encrypted database
631
Security on database systems and distributed databases
632
Security on IPv6
633
Security on MANETs using block coding
634
Security on MASs with XML Security Specifications
635
Security on RFID technology
636
Security on Software Life Cycle using Intrusion Detection System
637
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response
638
Security On The Net
639
Security on the quantum-type Even-Mansour cipher
640
Security Ontologies: Improving Quantitative Risk Analysis
641
Security Ontology Proposal for Mobile Applications
642
Security Operation Center Based on Immune System
643
Security Operation Center Design Based on D-S Evidence Theory
644
Security Operation Modes for Enhancement of Utility Computer Network Cyber-Security
645
Security operations center ? A need for an academic environment
646
Security or cosmetology?
647
Security or Privacy? A Matter of Perspective
648
Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture
649
Security Oriented Analysis of B92 by Model Checking
650
Security oriented codes
651
Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials
652
Security oriented service composition: A framework
653
Security Outlook: Six Cyber Game Changers for the Next 15 Years
654
Security Overhead and Its Impact in VANETs
655
Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs
656
Security overview for m-payed virtual ticketing
657
Security pairings using physical layer properties of wireless communications
658
Security Paradigm in Ubiquitous Computing
659
Security paradigm of FPGA against Differential Power Analysis attack
660
Security Paradigms for Cloud Computing
661
Security parallels between people and pervasive devices
662
Security Pattern Evaluation
663
Security Pattern Lattice: A Formal Model to Organize Security Patterns
664
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
665
Security Patterns for Voice over IP Networks
666
Security patterns: a method for constructing secure and efficient inter-company coordination systems
667
Security perception in e-commerce: Conflict between customer and organizational perspectives
668
Security performance
669
Security performance analysis of SNMPv3 with respect to SNMPv2c
670
Security performance of multiple antennas multiple relaying networks with outdated relay selection
671
Security performance of optical CDMA Against eavesdropping
672
Security performance of spectral amplitude coding OCDMA systems
673
Security performances of a chaotic cryptosystem
674
Security personnel screening
675
Security Philosophy Important for a Sustainable Smart Grid System
676
Security PIDS with physical sensors, real-time pattern recognition, and continuous patrol
677
Security pipeline interface (SPI)
678
Security pitfalls of frame-by-frame approaches to video watermarking
679
Security planning for small businesses: A service-learning course
680
Security points for BcN infrastructure
681
Security Policies and Security Models
682
Security policies and the software developer
683
Security policies based on security requirements of city Emergency Management Information System multi-layer structure
684
Security policies for sharing knowledge in virtual communities
685
Security Policies in Adaptive Process-Aware Information Systems: Existing Approaches and Challenges
686
Security Policies in Distributed CSCW and Workflow Systems
687
Security policies to mitigate insider threat in the document control domain
688
Security Policy Alignment: A Formal Approach
689
Security policy based device management for supporting various mobile OS
690
Security Policy Compliance: User Acceptance Perspective
691
Security Policy Composition for Composite Services
692
Security Policy Composition for Composite Web Services
693
Security policy coordination for heterogeneous information systems
694
Security policy decision for automation of security network configuration
695
Security Policy Design on Informatization for a Typical Labor and Social Security Bureau
696
Security policy enforcement at the file system level in the Windows NT operating system family
697
Security Policy Enforcement in BPEL-Defined Collaborative Business Processes
698
Security policy enforcement in modern SoC designs
699
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
700
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
701
Security policy in a complex logistics procurement
702
Security policy integration and conflict reconciliation for data integration across data sharing services in ubiquitous computing environments
703
Security Policy Integration Method for Information Systems
704
Security policy management for healthcare system network
705
Security policy management for networked information systems
706
Security Policy Management for Peer Group Meetings
707
Security policy modeling for the next-generation packet switch
708
Security Policy Modeling using Z notation for Common Criteria version 3.1
709
Security Policy Pre-evaluation towards Risk Analysis
710
Security policy realization in an extensible operating system
711
Security policy reconciliation in distributed computing environments
712
Security Policy Refinement: High-Level Specification to Low-Level Implementation
713
Security policy selection method of pipeline transportation based on analytic hierarchy process
714
Security Policy Specification and Integration in Business Collaboration
715
Security policy specification templates for critical infrastructure services in the cloud
716
Security Policy Synthesis in Mobile Systems
717
Security policy system: status and perspective
718
Security policy testing using vulnerability exploit chaining
719
Security policy validation using temporal executable specifications
720
Security preferences specification and implementation in a service-based workflow
721
Security Pre-screening of Moving Persons Using a Rotating Multichannel W -Band Radar
722
Security preserving amplification of hardness
723
Security price dynamics and simulation in financial engineering
724
Security pricing: A catalyst for the large scale adoption of cloud computing
725
Security primitives and protocols for ultra low power sensor systems
726
Security principles for public-resource modeling research
727
Security principles for web applications
728
Security Problems and Countermeasures with Commercial Banking Computer Networks
729
Security problems for statistical databases with general cell suppressions
730
Security problems in BGP: An overview
731
Security problems in cloud infrastructure
732
Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems
733
Security processor for bulk encryption
734
Security processor with quantum key distribution
735
Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition
736
Security Prognostics: Cyber meets PHM
737
Security proof of a semi-quantum key distribution protocol
738
Security proof of Improved-SARG04 protocol using the same four qubit states
739
Security Proofs for Information Protection Systems
740
Security Properties Analysis of Routing Protocol for MANET
741
Security properties and CSP
742
Security properties consistent with the testing semantics for communicating processes
743
Security Properties in Virtual Organizations
744
Security properties of oscillator rings in true random number generators
745
Security properties of ring brackets
746
Security Properties of Self-Similar Uniformly Parameterised Systems of Cooperations
747
Security Property Violation in CPS through Timing
748
Security proposal for AMI network on a industrial wireless sensor network
749
Security Prospects through Cloud Computing by Adopting Multiple Clouds
750
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
751
Security protection and checking in embedded system integration against buffer overflow attacks
752
Security protection based on mission criticality
753
Security protection between users and the mobile media cloud
754
Security protection discuss of power load management (LM) based on GPRS/CDMA
755
Security Protection for Online Learning of Music
756
Security protection technology of intelligent electricity selling terminal
757
Security protection using simple object access protocol (SOAP) messages techniques
758
Security Protective Measures for the Ubiquitous City Integrated Operation Center
759
Security Protocol Analysis Based on Rewriting Approximation
760
Security protocol architecture for website authentications and content integrity
761
Security Protocol Design for Electronic-Cash Transactions in a Mobile-PKI Environment
762
Security protocol design via authentication tests
763
Security Protocol for Active Networks
764
Security protocol for VANET by using digital certification to provide security with low bandwidth
765
Security Protocol Testing Using Attack Trees
766
Security Protocols Against Cyber Attacks in the Distribution Automation System
767
Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis
768
Security protocols as environments: A lesson from non-collaboration
769
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
770
Security protocols for wireless sensor networks
771
Security Protocols in MANETs
772
Security Protocols in Service-Oriented Architecture
773
Security protocols in the Internet new framework
774
Security protocols in wireless tactical sensor networks
775
Security provision in systems with large penetration of wind power generation
776
Security push for enterprise messaging - watchpoint
777
Security QoS profiling against cyber terrorism in airport network systems
778
Security Quality Assurance on Web-Based Application through Security Requirements Tests: Elaboration, Execution and Automation
779
Security radio data transmission mode based on turbo codes for the CBTC system
780
Security Random Network Coding Model against Byzantine Attack Based on CBC
781
Security recommendations for implementation in distributed healthcare systems
782
Security Refresh: Protecting Phase-Change Memory against Malicious Wear Out
783
Security region analysis of power systems
784
Security Region Based Probabilistic Security Assessment of Power Transmission System a Basic Concepts
785
Security region of bulk power system
786
Security Related Data Mining
787
Security related long-run marginal cost analysis of transmission services
788
Security relevancy analysis on the registry of Windows NT 4.0
789
Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems
790
Security Requirement Engineering at a Telecom Provider
791
Security Requirement for Cyber Attack Traceback
792
Security requirement with a UML 2.0 profile
793
Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems
794
Security requirements and concepts for intelligent networks
795
Security requirements and models in open systems
796
Security Requirements and Protocols for a Broadcast Scenario
797
Security requirements and solution concepts in vehicular ad hoc networks
798
Security requirements and solutions for integrated satellite-terrestrial Information-Centric Networks
799
Security Requirements Elicitation and Assessment Mechanism (SecREAM)
800
Security Requirements Elicitation Using View Points for Online System
801
Security Requirements Elicitation via Weaving Scenarios Based on Security Evaluation Criteria
802
Security Requirements Engineering for Software Systems: Case Studies in Support of Software Engineering Education
803
Security Requirements Engineering in the Wild: A Survey of Common Practices
804
Security Requirements Engineering Process for Software Product Lines: A Case Study
805
Security requirements engineering via commitments
806
Security Requirements Engineering: A Framework for Representation and Analysis
807
Security requirements engineering: when anti-requirements hit the fan
808
Security Requirements for a Semantic Service-oriented Architecture
809
Security requirements for automotive on-board networks
810
Security requirements for IP over satellite DVB networks
811
Security requirements for management systems using mobile agents
812
Security requirements for MANETs used in emergency and rescue operations
813
Security requirements for smart grid services in Japan
814
Security Requirements for the Rest of Us: A Survey
815
Security Requirements for Uniformly Parameterised Cooperations
816
Security requirements formalized with OCL in a model-driven approach
817
Security requirements in communication networks for transportation systems
818
Security requirements of next generation wireless communications
819
Security requirements patterns: understanding the science behind the art of pattern writing
820
Security requirements planning to anticipate the traffic flooding on the backbone network
821
Security Requirements Specification in Service-Oriented Business Process Management
822
Security Requirements Variability for Software Product Lines
823
Security Research at NASK: Supporting the Operational Needs of a CERT Team and More
824
Security research of state cryptographic authentication security chip in smart grid
825
Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices
826
Security Research on J2ME-Based Mobile Payment
827
Security research on mobile IP network handover
828
Security Research on P2P Network
829
Security Research on WiMAX with Neural Cryptography
830
Security review of email summarization systems
831
Security risk analysis and evaluation
832
Security risk analysis as a service
833
Security risk analysis based on probability of system failure, attacks and vulnerabilities
834
Security risk analysis for asset in relation to vulnerability, probability of threats and attacks
835
Security risk analysis for smart grid automation
836
Security risk analysis of RFID technology: A RFID tag life cycle approach
837
Security risk analysis of software architecture based on AHP
838
Security Risk Analysis Used by Kuwait Government Sectors
839
Security risk assessment and weaknesses identification of the substation automation system
840
Security risk assessment methodology for communities (RAM-C)
841
Security Risk Assessment Model Based on AHP/D-S Evidence Theory
842
Security Risk Assessment of Cloud Carrier
843
Security risk assessment of cyber physical power system based on rough set and gene expression programming
844
Security risk assessment of process plants: The role of layout
845
Security risk assessment of TeamViewer application
846
Security risk assessment process for UAS in the NAS CNPC architecture
847
Security Risk Evaluation Model on Management Information System
848
Security Risk Evaluation of Information Systems Based on Game Theory
849
Security Risk Management by Qualitative Vulnerability Analysis
850
Security Risk Management in complex organization
851
Security Risk Management in Computing Systems with Constraints on Service Disruption
852
Security Risk Management Using Incentives
853
Security Risk Management via Dynamic Games with Learning
854
Security risk metrics: fusing enterprise objectives and vulnerabilities
855
Security risk modelling using SecureUML
856
Security risks and countermeasures of college graduate employment of social transformation
857
Security risks and their management in cloud computing
858
Security risks in hardware: Implementation and detection problem
859
Security risks in mobile business
860
Security risks in the short-range communication of ubiquitous application
861
Security Risks Posed by Modern IC Debug and Diagnosis Tools
862
Security risks: management and mitigation in the software life cycle
863
Security role of biometrics in electronic transactions
864
Security Routing in MANETs - A Comparative Study
865
Security Rules Specification and Analysis Based on Passive Testing
866
Security safeguards for intelligent networks
867
Security scenarios within IP-based mobile multimedia metropolitan area network
868
Security scheme for 4G wireless systems
869
Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism
870
Security Scheme for Online Banking Based on Secret Key Encryption
871
Security Scheme for Sensitive Data in Management-Type SaaS
872
Security scheme research of digital products online transactions
873
Security schemes of power systems against blackouts
874
Security sense of Internet product interface design
875
Security sensitive software development
876
Security server incorporating relay servers for distributed processing environments
877
Security Server-Based Architecture for Mobile Ad Hoc Networks
878
Security service adaptation for embedded service systems in changing environments
879
Security service framework for home network
880
Security service system using autonomous mobile robot
881
Security services and enhancements in the IEEE 802.15.4 wireless sensor networks
882
Security services and public key infrastructure for ATM networks
883
Security Services Efficiency in Disadvantaged Networks
884
Security services for airborne networking
885
Security services for eSafety applications clusters
886
Security services in an open service environment
887
Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks
888
Security services in telecommunications networks
889
Security Services in Wireless Sensor Networks Using Sparse Random Coding
890
Security Services Lifecycle Management in On-Demand Infrastructure Services Provisioning
891
Security services provided by the IEEE Wireless Access in Vehicular Environments standards: Limitations and implications for intelligent cooperative driving and autonomous connected vehicles
892
Security sheath and intelligence countermeasure in emergency of intricacy system
893
Security simulation against side-channel attacks on Advanced Encryption Standard circuits based on equivalent circuit model
894
Security Simulation for Vulnerability Assessment
895
Security Simulation for Vulnerability Assessment
896
Security simulator in mobile computing environment
897
Security situation analysis and prediction system for large-scale network SSAP
898
Security Situation Assessment and Response Evaluation (SSARE)
899
Security Situation Assessment Based on the DS Theory
900
Security situation evaluation of service level in distributed mission-critical system
901
Security situation management - developing a concept of operations and threat prediction capability
902
Security situation management developing a concept of operations and threat prediction capability
903
Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESAR
904
Security skills: aptly qualified or merely mollified? [Professionalism: Qualifications & Accreditation]
905
Security SLAs for Federated Cloud Services
906
Security SLAs for IMS-based Cloud Services
907
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
908
Security Software Based on Windows NDIS Filter Drivers
909
Security software using neural networks
910
Security Solution For Data Integrity InWireless BioSensor Networks
911
Security solution for healthcare hybrid cloud platform
912
Security Solution for Mobile Ad Hoc Network of Networks (MANoN)
913
Security solution for semantic SCADA optimized by ECC mixed coordinates
914
Security solution suitability analysis using modified multiplicative analytic hierarchy process
915
Security solution to manufacturing grid usage scenarios
916
Security Solutions for Big Data Analytics in Healthcare
917
Security Solutions for Smart Spaces
918
Security solutions for Web Service attacks in a dynamic composition scenario
919
Security Solutions for Wireless Sensor Networks
920
Security Solutions in Mobile Autonomic Networks
921
Security solutions in the first-generation Zynq All-Programmable SoC
922
Security solutions in VoIP applications: State of the art and impact on quality
923
Security solutions of intelligent transportation system´s applications with using VANET networks
924
Security Spaces for Protecting Users of Wireless Public Hotspots
925
Security specification and implementation for mobile e-health services
926
Security specification and verification
927
Security Specification at Process Level
928
Security specification of WS-SecureConversation
929
Security specifications
930
Security standards and contribution made by embedded generation
931
Security standards and investment incentives
932
Security Standards for Electronic Health Records
933
Security standards for open systems
934
Security standards for the global information grid
935
Security standards for the RFID market
936
Security Standards Perspective to Fortify Web Database Applications from Code Injection Attacks
937
Security standards taxonomy for Cloud applications in Critical Infrastructure IT
938
Security State Fusion Based on Network Accessing Control Algorithm
939
Security Status of VoIP Based on the Observation of Real-World Attacks on a Honeynet
940
Security steps for smartphone users
941
Security strategies for field area networks
942
Security strategy for US Air Force to use commercial data link
943
Security Strategy of Digital Television Middleware System
944
Security Strategy of E-Commerce in China
945
Security Strategy of MANET Based on Identity-Based Cryptosystems
946
Security Strength Measurement for Dongle-Protected Software
947
Security strengthening by combining fingerprints
948
Security structure of cloud storage based on homomorphic encryption scheme
949
Security Structure Study of City Management Platform Based on Cloud Computing under the Conception of Smart City
950
Security studies at the planning stage: Influence of sever incidents on the stability of the french power system
951
Security study of keyed DNA data embedding
952
Security study of m-business: Review and important solutions
953
Security Study of Mobile Business Based on WPKI
954
Security study of network host supporting Mobile Agent
955
Security study of voice communication over wireless local area network
956
Security subsystems application/evaluation guide in General Services Administration
957
Security Support for Intention Driven Elastic Cloud Computing
958
Security Support for Mobile Grid Services Framework
959
Security synthesis algorithm for electricity-supply networks
960
Security system against asset theft by using Radio Frequency Identification Technology
961
Security system and actual operation benefit of data transmission on heterogeneous network
962
Security system based on signals reflectometer
963
Security system based on speech recognition in M-Commerce
964
Security system breaches cost millions
965
Security system construction of land and resources network based on intrusion detection
966
Security system for children on school route
967
Security System for Die Cutting Press
968
Security System for Internal Network Printing
969
Security System for Migrating Crawlers
970
Security system for optical communication signals with fiber Bragg gratings
971
Security System for Overlapping Non-dedicated Clusters
972
Security system for power plant with wireless sensor network using WHM-1 wireless module
973
Security system for road automobile communication system
974
Security system for surveillance radar network communication using chaos algorithm
975
Security system for wireless local area networks
976
Security system of agricultural inventory management system
977
Security system throughput modeling
978
Security system using biometric technology: Design and implementation of Voice Recognition System (VRS)
979
Security Systems Research and Testing Laboratory at Edith Cowan University
980
Security Systems Research and Testing Laboratory at Edith Cowan University
981
Security tactics for secured cloud computing resources
982
Security Tagging for a Zero-Kernel Operating System
983
Security techniques
984
Security techniques and specifications for the resources protection in mediation systems
985
Security Techniques for Beyond 3G Wireless Mobile Networks
986
Security Techniques For Network Management
987
Security techniques for the global information infrastructure
988
Security technologies for the protection of critical infrastructures — Ethical risks and solutions offered by standardization
989
Security technologies go phishing
990
Security technologies, usage and guidelines in SCADA system networks
991
Security technology
992
Security technology decision tree tool
993
Security Technology for Smart Grid Networks
994
Security technology in virtualization system: State of the art and future direction
995
Security Technology Progress: The 37th IEEE-AESS Carnahan Conference, Taiwan
996
Security Technology. The 36th International Carnahan conference on security technology
997
Security test and evaluation for multilevel-mode accreditation: Lessons learned
998
Security Test Generation by Answer Set Programming
999
Security test generation using threat trees
1000
Security Testing Based on Attack Patterns
بازگشت