Computer network

Results: 31604



#Item
811Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
812Computing / Network protocols / Radio resource management / Network architecture / Technology / Proxy Mobile IPv6 / Mobile IP / Computer networking / Latency / Nemo / Cellular network / Handover

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.acisinternational.org

Language: English - Date: 2015-09-15 15:09:18
813Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
814Computer network security / Computing / Computer security / Cyberwarfare / Layer 2 Tunneling Protocol / DMZ / Virtual private network / Network switch / Secure Computing Corporation / Firewall

Secure Computing SnapGear™ User Manual Secure Computing 4810 Harwood Road San Jose, CA

Add to Reading List

Source URL: go.mcafee.com

Language: English - Date: 2006-08-31 03:33:18
815Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
816Computing / Cryptography / Security / Prevention / Computer network security / Password / Cloud computing / Computer security / Cloud storage / File hosting service / Browser security / Salt

Media Shuttle’s Defense-inDepth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among the various pl

Add to Reading List

Source URL: info.signiant.com

Language: English - Date: 2016-07-16 02:23:51
817Artificial intelligence / Computer vision / Artificial intelligence applications / MNIST database / Computational neuroscience / Automatic identification and data capture / Machine learning / Handwriting recognition / Optical character recognition / Pattern recognition / Support vector machine / Artificial neural network

Microsoft Word - The Role of Size Normalization on the Recognition Rate of Handwritten Numerals.doc

Add to Reading List

Source URL: www.dsi.unifi.it

Language: English - Date: 2009-12-17 04:49:47
818Computing / File sharing networks / Concurrent computing / Distributed data storage / File sharing / Network protocols / Peer-to-peer / Session / Ono / GiFT / Computer cluster

Reciprocity with Virtual Nodes: Supporting Mobile Nodes in Peer-to-Peer Content Distribution Matthias Wichtlhuber, Peter Heise, Björn Scheurich and David Hausheer Motivation and Background Approach

Add to Reading List

Source URL: www.ps.tu-darmstadt.de

Language: English - Date: 2013-11-04 15:32:46
819Computing / Network architecture / Emerging technologies / Computer architecture / Software / 6WIND / Network function virtualization / Data Plane Development Kit / Open vSwitch / Red Hat / Virtualization / Hyper-V

INCREASE BUSINESS AGILITY WITH NETWORK FUNCTION VIRTUALIZATION Red Hat, Intel, and 6WIND’s virtual network functions foundation for the communications industry TECHNOLOGY OVERVIEW VIRTUALIZING COMMUNICATIONS INFRASTRU

Add to Reading List

Source URL: www.6wind.com

Language: English - Date: 2014-04-09 10:17:23
820Security / Cybercrime / National security / Prevention / Computer network security / Computer security / Cryptography / Cyberwarfare / Cyber-attack / Cyberwarfare in the United States / The Centre for Secure Information Technologies

Microsoft Word - SOE - White PaperCyber Security Engineering Studio.docx

Add to Reading List

Source URL: marketing.sandiego.edu

Language: English - Date: 2016-03-03 12:31:40
UPDATE