Advances in Networks, Computing and Communications 3Paul Dowland, Steven Furnell, University of Plymouth. School of Computing, Communications and Electronics Lulu.com, 2006 - 279 頁 |
內容
Communications Engineering and Signal | 12 |
Security policies for small and medium enterprises | 20 |
Network Security Audit | 39 |
A Comparison of Performance and Pattern | 57 |
Netmates | 75 |
Trends in Malware Variant Development | 90 |
Neuralbased TCP performance modelling | 109 |
How will BT meet the challenge to provide multimedia services over its | 121 |
Nonlinear analysis of the Human Electroencephalogram for the detection of | 167 |
Information Systems Security | 177 |
Chelleth S M Furnell M Papadaki G Pinkney and P S Dowland | 185 |
Changing Trends in Vulnerability Discovery | 193 |
S W Tope S M Furnell M Papadaki and G Pinkney | 203 |
Computing Computer Applications Ecommerce | 213 |
Using WSAddressing To Perform Asynchronous Web Service Calls | 223 |
Ecommerce Completing the Supply Chain | 232 |
Will all Communication be wireless thus investment in Fibre is a waste of | 129 |
Watermarking for Copyright Protection | 138 |
Interference SelfCancellation Technique In MQAM Modulated OFDM | 147 |
Nonlinear Dynamical Analysis of EEG for Early Detection of Degenerative | 158 |
The State of Elderly in ICT Adoption at Rural Area | 241 |
Language acquisition in Epigenetic Robotics | 250 |
How not to evolve a neural network for robot football players | 259 |
267 | |
其他版本 - 查看全部
常見字詞
alerts algorithm analysis antivirus applications asynchronous attacks authentication average Beagle behaviour biometric BPEL cognitive questions communication companies connection cost detection E-commerce elderly encryption extraction factors Figure FTTH Globus toolkit grid grid computing implementation impostors improve increase info@network-research-group.org Abstract interface Internet issues key logger malware Mayenne methods Microsoft mobile devices Mytob Netmates Netsky Network Research Group neural network OFDM operating systems organisations packets paper PassImages passwords performance phishing problem proxy retriever robot robustness security audit security policy September 2005 server shoulder surfing signal simulations small and medium SMEs Snort social engineering solution Super Fast Retransmit Symantec techniques technologies threats timeout tool Trend Micro trends United Kingdom e-mail University of Plymouth users variants VoIP VoIP systems vulnerabilities watermark web service wireless WS-Addressing