ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Domain 2 - Communications & Network Security
Official (ISC)2® Guide to the ISSAP® CBK
◽
10.1201/9781315373300-6
◽
2017
◽
pp. 157-262
Keyword(s):
Network Security
◽
Communications Network
Download Full-text
Related Documents
Cited By
References
Communications & Network Security
(ISC)2 Press - Official (ISC)2® Guide to the ISSAP® CBK, Second Edition
◽
10.1201/b15693-3
◽
2013
◽
pp. 131-235
Keyword(s):
Network Security
◽
Communications Network
Download Full-text
Domain 4: Communications & Network Security
Official (ISC)2 Guide to the CISSP CBK
◽
10.1201/b18257-10
◽
2015
◽
pp. 479-660
Keyword(s):
Network Security
◽
Communications Network
◽
Domain 4
Download Full-text
Authorship Pattern and Collaborative Research in the Field of Network Security
Indian Journal Of Applied Research
◽
10.15373/2249555x/jan2013/21
◽
2011
◽
Vol 3
(1)
◽
pp. 52-54
◽
Cited By ~ 1
Author(s):
N. Amsaveni N. Amsaveni
◽
◽
R. Vasanthi R. Vasanthi
Keyword(s):
Network Security
◽
Collaborative Research
◽
Authorship Pattern
Download Full-text
COMMUNICATIONS RECONSTRUCTION FOR A NETWORK SECURITY ANALYSIS
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v69.i7.50
◽
2010
◽
Vol 69
(7)
◽
pp. 629-638
Author(s):
J. Sisniega-Gonzalez
◽
E. Aguirre-Anaya
◽
Mariko Nakano-Miyatake
◽
Hector Manuel Perez-Meana
Keyword(s):
Network Security
◽
Security Analysis
Download Full-text
REAL-TIME TRAFFIC DETECTION AND ANALYSIS OF NETWORK SECURITY INTRUSION ATTACK: SNORT INTRUSION PREVENTION SYSTEM
Telecommunications and Radio Engineering
◽
10.1615/telecomradeng.v79.i12.30
◽
2020
◽
Vol 79
(12)
◽
pp. 1055-1062
Author(s):
A. L. Zhou
Keyword(s):
Network Security
◽
Real Time
◽
Intrusion Prevention
◽
Real Time Traffic
◽
Prevention System
◽
Intrusion Prevention System
◽
Traffic Detection
Download Full-text
An example of on-board processing in a satellite integrated communications network
10.2514/6.1988-829
◽
1988
◽
Author(s):
H. KUHLEN
Keyword(s):
Communications Network
◽
Integrated Communications
Download Full-text
Rule Based Network Security Using Genetic Algorithm
i-manager’s Journal on Software Engineering
◽
10.26634/jse.1.4.760
◽
2007
◽
Vol 1
(4)
◽
pp. 85-91
Author(s):
Jeya S
◽
◽
Ramar K
◽
Keyword(s):
Genetic Algorithm
◽
Network Security
◽
Rule Based
Download Full-text
Information technology. Security techniques. Network security
10.3403/30168527u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104u
◽
2015
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Network security
10.3403/30192104
◽
2011
◽
Keyword(s):
Information Technology
◽
Network Security
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close