Intelligent Network Surveillance Technology for APT Attack Detections
Utilizing Graph Theory to Model Forensic Examination
Agent based Authentication for Deep Web Data Extraction
COORDINATE BASED ENCRYPTION PROTOCOL
AREA EFFICIENT ENCODING TECHNIQUE FOR REDUCING POWER IN DSRC
Risk Analysis of Insurance companies Fund application in China
Design and Development of an E-Commerce Security Using RSA Cryptosystem
A Survey of Key Management Framework for Wireless Mobile Environment
Coarse Grain Reconfigurable Floating Point Unit
Enhancing the Security in WSN using Three Tier Security Architecture
Modernisation of Avionics and C.N.S. Facilities
The Analysis of Marketing Personnel Performance Appraisal Problems of Small and Medium-Sized Enterprises
Regional Economic Development from the Perspective of Circular Economy-- From "APEC blue" of the Enlightenment
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
The Analysis of the Distribution Mode of Rookie Network
An Energy–Efficient Heuristic based Routing Protocol in Wireless Sensor Networks
CT-SVD and Arnold Transform for Secure Color Image Watermarking
Mathematical foundations of Multithreaded programming concepts in Java language
Material Flow Management for Treating Waste from Medical Activity
VANCL logistics operations mode selection analysis