A Collaborative Network Security Platform in P2P Networks Chun-Hsin Wang; Chun-Wei Huang; New Trends in Information and Service Science, 2009. Security and QoS Self-Optimization in Mobile Ad Hoc Networks Xi, Jianrong; Machine Vision and Human-Machine Interface (MVHI), 2010.
A Collaborative Network Security Platform in P2P Networks Chun-Hsin Wang; Chun-Wei Huang; New Trends in Information and Service Science, 2009. Security and QoS Self-Optimization in Mobile Ad Hoc Networks Xi, Jianrong; Machine Vision and Human-Machine Interface (MVHI), 2010.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
A Collaborative Network Security Platform in P2P Networks Chun-Hsin Wang; Chun-Wei Huang; New Trends in Information and Service Science, 2009. Security and QoS Self-Optimization in Mobile Ad Hoc Networks Xi, Jianrong; Machine Vision and Human-Machine Interface (MVHI), 2010.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as TXT, PDF, TXT or read online from Scribd
Wu Kehe; Zhang Tong; Li Wei; Ma Gang; Computer Technology and Development, 2009. ICCTD '09. International Conference o n Volume: 1 Digital Object Identifier: 10.1109/ICCTD.2009.160 Publication Year: 2009 , Page(s): 577 - 580 2. An Approach for Security Assessment of Network Configurations Using Attack Graph Ghosh, N.; Ghosh, S.K.; Networks and Communications, 2009. NETCOM '09. First International Conference on Digital Object Identifier: 10.1109/NetCoM.2009.83 Publication Year: 2009 , Page(s): 283 - 288 3. A Collaborative Network Security Platform in P2P Networks Chun-Hsin Wang; Chun-Wei Huang; New Trends in Information and Service Science, 2009. NISS '09. International Con ference on Digital Object Identifier: 10.1109/NISS.2009.222 Publication Year: 2009 , Page(s): 1251 - 1256 4. Network security authentication of power system operations Cheung, H.; Hamlyn, A.; Cungang Yang; Electrical and Computer Engineering, 2008. CCECE 2008. Canadian Conference on Digital Object Identifier: 10.1109/CCECE.2008.4564831 Publication Year: 2008 , Page(s): 001687 - 001692 5. Research on Risk Aversion of E-Government Network Security Xiaohong Gan; Management of e-Commerce and e-Government, 2008. ICMECG '08. International Confe rence on Digital Object Identifier: 10.1109/ICMECG.2008.61 Publication Year: 2008 , Page(s): 144 - 148 6. Network Security Platform Design Based on WWW Information System Xi, Jianrong; Machine Vision and Human-Machine Interface (MVHI), 2010 International Conference on Digital Object Identifier: 10.1109/MVHI.2010.42 Publication Year: 2010 , Page(s): 365 - 368 7. Security and QoS Self-Optimization in Mobile Ad Hoc Networks ZhengMing Shen; Thomas, J.P.; Mobile Computing, IEEE Transactions on Volume: 7 , Issue: 9 Digital Object Identifier: 10.1109/TMC.2007.70754 Publication Year: 2008 , Page(s): 1138 - 1151 8. A new technology for an Information Network of Security and Authorization Hirata, K.; Aoki, H.; Consumer Electronics, 2009. ISCE '09. IEEE 13th International Symposium on Digital Object Identifier: 10.1109/ISCE.2009.5157057 Publication Year: 2009 , Page(s): 704 - 708 9. Sensor network-based AMI network security Jincheol Kim; Seongji Ahn; Youngeok Kim; Kidong Lee; Sangjin Kim; Transmission and Distribution Conference and Exposition, 2010 IEEE PES Digital Object Identifier: 10.1109/TDC.2010.5484300 Publication Year: 2010 , Page(s): 1 - 5 10. Network Security Protection Solutions of Electric Power Enterprise Based on VPN Technology Zhu Enguo; Wu Guoliang; Yang Gongxun; Computational Intelligence and Security, 2009. CIS '09. International Conference on Volume: 2 Digital Object Identifier: 10.1109/CIS.2009.235 Publication Year: 2009 , Page(s): 402 - 405