Secure Fog Computing: Providing Data Security Journal title: International Journal of Research in Computer and Communication Technology Authors: T.Rajesh Kanna, M. Nagaraju, Ch. Vijay Bhaskar Subject(s): Computer and Information Science, Telecommunications
Exemplary Instinctive Repression Of Worms Journal title: International Journal of Research in Computer and Communication Technology Authors: Manuri Parthasarathi, Jhansi Rani S Subject(s): Computer and Information Science, Telecommunications
Perceiving TheMalevolent Sachet Fatalities Journal title: International Journal of Research in Computer and Communication Technology Authors: Puvvula Krishna Kanth, Jhansi Rani S Subject(s): Computer and Information Science, Telecommunications
Aplicación de técnicas de fuerza bruta con diccionario de datos, para vulnerar servicios con métodos de autenticación simple “Contraseñas”, pruebas de concepto con software libre y su remediación Journal title: MASKANA Authors: Hernán M. Domínguez L., Edgar A. Maya O., Diego H. Peluffo O., Christian M. Crisanto Ñ. Subject(s): Engineering, Humanities, Social Sciences, Science
What Is This Sensor and Does This App Need Access to It? Journal title: Informatics Authors: Maryam Mehrnezhad and Ehsan Toreini Subject(s): Arts and Literature, Medicine, Information Science, Management Science
Security and Privacy in Online Social Networks: A Survey Journal title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems Authors: Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu Subject(s): Computer and Information Science, Data Communication and Networks, Industrial Management
Smart Grid Attacks and Countermeasures Journal title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems Authors: Eric McCary, Yang Xiao Subject(s): Computer and Information Science, Data Communication and Networks, Industrial Management
Attribution of Cyber Attacks on Industrial Control Systems Journal title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems Authors: Allan Cook, Andrew Nicholson, Helge Janicke, Leandros Maglaras, Richard Smith Subject(s): Computer and Information Science, Data Communication and Networks, Industrial Management
A STUDY ON INTRUSION DETECTION Journal title: International Journal of Advanced Research in Engineering and Technology Authors: SYEDA GAUHAR FATIMA, SYEDA KAUSAR FATIMA, SYED ABDUL SATTAR and SYED ADIL Subject(s): Engineering
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY Journal title: International Journal of Advanced Research in Engineering and Technology Authors: SYEDA KAUSAR FATIMA, SYEDA GAUHAR FATIMA, SYED ABDUL SATTAR and SYED MOHD ALI Subject(s): Engineering
TRUST MODEL WITH DEFENSE SCHEME IN MANETS Journal title: International Journal of Advanced Research in Engineering and Technology Authors: SYEDA KAUSAR FATIMA, SYEDA GAUHAR FATIMA ,SYED ABDUL SATTAR and SYED MOHD ALI Subject(s): Engineering
A 3-LEVEL MULTIFACTOR AUTHENTICATION SCHEME FOR CLOUD COMPUTING Journal title: International Journal of Computer Engineering & Technology (IJCET) Authors: CHARANJEET SINGH and TRIPAT DEEP SINGH Subject(s): Computer and Information Science, Engineering
1,000 operations of carotid artery stenosis in Bielanski hospital – development of opinions inspired by recommendations and own experience Journal title: Postępy Nauk Medycznych Authors: Walerian Staszkiewicz, Grzegorz Madycki, Andrzej Gabrusiewicz, Paweł Dąbek, Witold Raciborski,... Subject(s):
1000 operacji miażdżycowych zwężeń tętnic szyjnych w szpitalu Bielańskim – ewolucja poglądów oparta na rekomendacjach i doświadczeniu własnym Journal title: Postępy Nauk Medycznych Authors: Walerian Staszkiewicz, Grzegorz Madycki, Andrzej Gabrusiewicz, Paweł Dąbek, Witold Raciborski,... Subject(s):