Search
Now showing items 1-10 of 412
Counter Synchronization in CCMP Algorithm
Year: 2005
Abstract:
To improve the security of Wireless Local Area Networks, the IEEE has recently standardized the 802.11i protocol. The 802.11i is based on two main components. It uses a new protocol, called CCMP for data-confidentiality ...
The protectors
Publisher: IET
Year: 2014
Network intrusion detection based on neuro-fuzzy classification
Year: 2006
Abstract:
With rapid growth of computer networks during the past few years, network security has become a crucial issue. Among the various network security measures, intrusion detection systems (IDS) play a vital role to integrity, ...
Adaptive time-domain windowing based transmit power control for TVWS-WLAN systems
Publisher: IEEE
Year: 2014
A New Algorithm for Carry-Free Addition of Binary Signed-Digit Numbers
Publisher: IEEE
Year: 2014
Towards an extended tool for analysis of extended feature models
Publisher: IEEE
Year: 2014
Modified Z-source inverter based three phase induction motor drive for solar PV applications
Publisher: IEEE
Year: 2014
Fear of frying electromagnetic weapons threaten our data networks. Here's how to stop them
Publisher: IEEE
Year: 2014
Assessing and safeguarding network resilience to nodal attacks
Publisher: IEEE
Year: 2014
Workspace mapping and control of a teleoperated endoscopic surgical robot
Publisher: IEEE
Year: 2014