共 50 条
- [31] A WEB APPLIANCE IMPLEMENTATION: REDUCING AND SECURING NETWORK TRAFFIC IN A VIRTUAL LABORATORY ENVIRONMENT 3RD INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI2010), 2010, : 6456 - 6465
- [32] A Security Test Message Generation Algorithm of Diameter Protocol in the IMS Network 2015 2ND INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING AND INTERNET OF THINGS (DCIT), 2015, : 72 - 79
- [34] A DIGITAL SNAKE IMPLEMENTATION OF THE BACK-PROPAGATION NEURAL NETWORK 1989 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-3, 1989, : 2185 - 2188
- [35] Cognitiva - A Cognitive Industrial Wireless Network Protocol Protocol Design and Testbed Implementation PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2016, : 2042 - 2047
- [36] Securing Network Time Protocol : Crackers discover how to use NTP as a weapon for abuse 1600, Association for Computing Machinery (13):
- [37] Securing ZRP Routing Protocol Against DDoS Attack in Mobile Ad Hoc Network ADVANCES IN DATA AND INFORMATION SCIENCES, ICDIS 2017, VOL 2, 2019, 39 : 387 - 396
- [38] Implementation of IoT System for Securing Telecommunications Infrastructure Based on LoRaWAN Operator's Network PROCEEDINGS OF 18TH INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES (IEEE EUROCON 2019), 2019,
- [39] Design and Implementation of Network Transfer Protocol for Big Genomic Data 2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, 2015, : 281 - 288
- [40] Design and Implementation of a Centralized Routing Protocol for Wireless Sensor Network 2016 10TH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2016,