Search results

Jump to navigation Jump to search
  • * Denial of Service Protection * Insider Threat protection
    2 KB (283 words) - 10:18, 11 March 2022
  • * • Denial of Service Protection * • Data Protection
    2 KB (198 words) - 10:59, 8 March 2021
  • |Title=SCN-CyberIoT 2017 : Special Issue on Cybersecurity in the Internet of Things - Security and Communication Networks Journal all provided with Internet connection, all potentially dealing with sensitive
    4 KB (548 words) - 11:18, 8 March 2021
  • With the continuous proliferation of diverse Internet-based computing paradigms, further fueled up by the new development of IoT (Internet of Things)
    4 KB (533 words) - 10:58, 8 March 2021
  • |Field=internet of things protection
    4 KB (443 words) - 11:08, 8 March 2021
  • |Title=The 5th International Conference for Internet Technology and Secured Transactions, Technical Co-Sponsored by IEEE UK/RI C The 5th International Conference for Internet Technology and Secured Transactions (ICITST-2010), Technical Co-Sponsored
    5 KB (608 words) - 10:53, 8 March 2021
  • ...es and formalisms; Security and design vulnerability; Security and privacy protection; Performance and security; Secure group communication/multicast; Software d Internet security; Security in wireless; Sensor/cellular network security; Ad hoc ne
    6 KB (746 words) - 20:18, 17 February 2021
  • |Title=WorldCIS 2017 : World Congress on Internet Security theory and practical implementation of security on the Internet and Computer
    5 KB (572 words) - 11:28, 8 March 2021
  • * Software Protection * Internet Security
    2 KB (218 words) - 10:29, 8 March 2021
  • * Software Protection * Internet Security
    2 KB (218 words) - 10:28, 8 March 2021
  • |Title=The Fifth International Conference on Internet Monitoring and Protectio ICIMP 2010: The Fifth International Conference on Internet Monitoring and Protection
    14 KB (1,652 words) - 10:52, 8 March 2021
  • ...r, PVR, Interconnects, Game Systems, Interactive and Directed Programming, Internet Integration, Next-Generation DVD, Displays Wired and Wireless Multimedia, QoS, Security, Peer-to-Peer, Internet Appliances, Home Control, Bridges, Interoperability, Application Control, H
    3 KB (354 words) - 19:54, 17 February 2021
  • |Title=The Sixteenth International Conference on Internet Monitoring and Protection ...MP 2021, The Sixteenth International Conference on Internet Monitoring and Protection
    17 KB (2,032 words) - 11:53, 8 March 2021
  • software is being developed for a variety of applications - web, Internet, * Software Security for Web and Internet Applications
    4 KB (563 words) - 10:57, 8 March 2021
  • Data Protection Internet and Network Forensics
    2 KB (309 words) - 10:54, 8 March 2021
  • |Title=The Fifteenth International Conference on Internet Monitoring and Protection |Field=internet monitoring, internet protection
    17 KB (2,089 words) - 10:52, 8 March 2021
  • Internet Security & Applications • Virus, worms, Trojon Protection
    3 KB (339 words) - 19:50, 17 February 2021
  • - Web 2.0 Security, Mobile Internet - Internet Security & Applications
    5 KB (667 words) - 12:10, 28 January 2021
  • ...n tracks, covering different aspects of Web Information Systems, including Internet Technology, Web Interfaces and Applications, Society, e-Communities, e-Busi 1. INTERNET TECHNOLOGY
    5 KB (628 words) - 11:26, 8 March 2021
  • Schneier’s article “The Internet is a surveillance state” summarised the state of Internet privacy as “Welcome to an Internet without privacy,
    7 KB (902 words) - 11:16, 8 March 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)