搜索资源列表
Network.Security.and.Firewalls
- 关于网络安全与防火墙方面的技术文档,介绍了各种网络安全技术
NFC_Overview_draft
- This Power Point slide talks about RFID technology overview. Contents: + Introduction. + Basic Features. + Related Technologies. + Applications. + Security Aspects.
adhoc_tutorial_PPT
- 详细介绍无线多跳adhoc网络的PPT.包括网络中的MAC层和路由层介绍、常用的协议算法,存在的问题,TCP与UDP协议性能比较,安全问题等,有助于了解Ad hoc网络的概况 -Details of the wireless multi-hop adhoc networks PPT. Including the network MAC layer and routing layer descr iption of the protocol algorithm used, problems,
SECURE_LEACH_ROUTING_PROTOCOL_BASED_ON_LOW-POWER_
- ABSTRACT In this paper we put forward a kind of secure LEACH routing protocol (SC-LEACH) based on low-power clusterhead selection algorithm. This protocol gets the total number of all nodes by their collaboration in selecting, to precisely calculat
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
ETeaching-security
- 电子商务安全实验教学研究,高校网络安全基础课程教学实践的讨论-Experimental Teaching e-commerce security. Pdf
Data-Storage-Security-in-Cloud-Computing
- Data security in cloud computing
(CAN)-Application-in-Security-System
- Can Application in Security system
802.11-Security
- Explains in detail about the need for802.11 security
Internet-Video-Security
- 对目前互联网视频内容安全的现状及相关技术进行了介绍,对互联网视频方面的新人了解行情与现状有一些帮助-Internet video content on the current security status and related technologies were introduced, new aspects of the Internet video market and understand the status of some help
Android-security
- 安卓安全机制,so注入和加壳技术简介,dex注入和加壳技术简介-Android security mechanisms, so injection and packers technical brief, dex injection and packers Technology Overview
A stochastic, contingency-based security-constrained optimal power flow for the procurement of energy and distributed re
- It is widely agreed that optimal procurement of reserves,with explicit consideration of systemcontingencies, can improve reliability and economic efficiency in power systems.With increasing penetration of uncertain generation resources, this optimal
Cooperative-Security-for-Network-
- 本文提出了网络编码,减少了验证对飞块成本,有效地防止恶意块的传播实用的安全解决方案。在我们的方案中,用户不仅合作发布内容,但用户也合作来保护自己免受恶意用户通知受影响的节点时,一个恶意的块被发现。-This paper presents a practical security scheme for network coding that reduces the cost of verifying blocks on-the-fly while efficiently preventing th
Enhancing-Cloud-Storage-Security
- 本文介绍了加强云存储安全性对Roll-back攻击的fangfa-Enhancing Cloud Storage Security against Roll-back Attacks
Embedded-Systems-Security
- Embedded Systems Security
Springer.Introduction.to.Hardware.Security.and.Tr
- Understanding Hardware Security
Network-Security-Strategy-in-Bigdata
- 收藏的关于大数据时代的网络安全策略的论文,和大家一同分享。-The article firstly overviewed “Big Data Research and Development Initiative” announced recently by the U.S. federal government a perspective of big data-based information network security development, especially an
Wireless-Network-Security
- 无线广域网、无线城域网、无线局域网、无线个域网、无线体域网等无线网络 的基本特点,然后从无线网络的开放性、移动性、动态变化以及传输信号的不稳定性和终端设备等方面比较 了无线网络安全和有线网络安全的区别,最后提出并详细解释了解决无线网络安全问题的一般思路。-This article firstly introduces basic characteristics of various wireless networks, such as wireless wide area netwo
wireless-sensor-network-security
- 传感器网络安全现状、面临的安全挑战及其需要解决的安全问题。-The current situations of sensor network security, the security challenges and the security problems were pre- sented.
Embedded-Systems-Security
- Embedded Systems Security Muhammad Farooq-i-Azam