×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [presence of malicious]
Education
AODV Protocol
1.519 views
Documents
Cyber Security in Evolving Enterprise Environments TechNet International 09 Adrian R Hartman, PhD Senior Manager & Architect LGS Innovations, Bell Labs
217 views
Documents
HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing
222 views
Documents
Overview - Kupcu
218 views
Engineering
Iaetsd a layered security approach through femto cell using
41 views
Documents
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion
223 views
Documents
Secure routing for structured peer-to-peer overlay networks Miguel Castro, Ayalvadi Ganesh, Antony Rowstron Microsoft Research Ltd. Peter Druschel, Dan
222 views
Documents
CS162 Operating Systems and Systems Programming Lecture 24 Distributed File Systems November 26, 2007 Prof. John Kubiatowicz cs162
213 views
Documents
MODELING AND ANALYSIS OF ATTACKS AND COUNTER DEFENSE MECHANISMS FOR CYBER PHYSICAL SYSTEMS -Robert Mitchell, Ing-Ray Chen, Member, IEEE Presented By, Manasa
215 views
Documents
Speaker : Hong-Ren Jiang A Novel Testbed for Detection of Malicious Software Functionality 1
213 views
Documents
a crime committed on a computer network, esp. the Internet
216 views
Documents
Robust Trust Establishment for MANETs
34 views
Next >