ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A Security Attack and Defense in the Grid Environment
Recent Advances in Parallel Virtual Machine and Message Passing Interface - Lecture Notes in Computer Science
◽
10.1007/3-540-45825-5_8
◽
2002
◽
pp. 10-10
Author(s):
Barton P. Miller
Keyword(s):
Grid Environment
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Related Documents
Cited By
References
Center for Infrastructure Assurance and Security - Attack and Defense Exercises
10.21236/ada523898
◽
2010
◽
Author(s):
Gregory B. White
Keyword(s):
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Design of Network Security Attack and Defense Target Range System Based on Cloud Computing
Proceedings of the 2018 International Conference on Information Hiding and Image Processing - IHIP 2018
◽
10.1145/3292425.3292440
◽
2018
◽
Author(s):
Zuyuan Huang
◽
Jing Zhou
Keyword(s):
Cloud Computing
◽
Network Security
◽
Target Range
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Web Session Security: Attack and Defense Techniques
Case Studies in Secure Computing
◽
10.1201/b17352-23
◽
2014
◽
pp. 412-427
◽
Cited By ~ 4
Keyword(s):
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Enterprise information security attack and defense strategy under ATP environment
Computational Intelligence and Industrial Engineering
◽
10.2495/ciie140451
◽
2014
◽
Author(s):
Jun-xi Liu
Keyword(s):
Information Security
◽
Enterprise Information
◽
Defense Strategy
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Research and Practice of “Device-Device” Security Attack and Defense Based on IoT + AI
Computer Science and Application
◽
10.12677/csa.2020.103048
◽
2020
◽
Vol 10
(03)
◽
pp. 464-470
Author(s):
峰 刘
Keyword(s):
Research And Practice
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications
Science of Cyber Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-03026-1_12
◽
2018
◽
pp. 172-180
Author(s):
Yexia Cheng
◽
Yuejin Du
◽
Jin Peng
◽
Shen He
◽
Jun Fu
◽
...
Keyword(s):
Defense Mechanisms
◽
Security Attack
◽
Attack And Defense
◽
Logic System
Start Chat
Download Full-text
Review on the IT security: Attack and defense
2016 International Conference on Engineering & MIS (ICEMIS)
◽
10.1109/icemis.2016.7745386
◽
2016
◽
Cited By ~ 3
Author(s):
Salah-ddine Krit
◽
Elbachir Haimoud
Keyword(s):
It Security
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Overview of Smartphone Security: Attack and Defense Techniques
Computer and Cyber Security
◽
10.1201/9780429424878-10
◽
2018
◽
pp. 249-279
Author(s):
Diksha Goel
◽
Ankit Kumar Jain
Keyword(s):
Smartphone Security
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Research of LAN Security Attack and Defense Technology
Proceedings of the 2016 2nd Workshop on Advanced Research and Technology in Industry Applications
◽
10.2991/wartia-16.2016.44
◽
2016
◽
Author(s):
Ying Peng
◽
Rongfu Wang
Keyword(s):
Security Attack
◽
Defense Technology
◽
Attack And Defense
Start Chat
Download Full-text
Overview of Wireless Security, Attack and Defense
Inside Radio: An Attack and Defense Guide
◽
10.1007/978-981-10-8447-8_1
◽
2018
◽
pp. 1-5
◽
Cited By ~ 1
Author(s):
Qing Yang
◽
Lin Huang
Keyword(s):
Wireless Security
◽
Security Attack
◽
Attack And Defense
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close