•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
Search 
  •   FUM Digital Library
  • Search
  •   FUM Digital Library
  • Search
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 412

    • Relevance
    • Title Asc
    • Title Desc
    • Year Asc
    • Year Desc
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
  • Export
    • CSV
    • RIS
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Counter Synchronization in CCMP Algorithm 

    Type: Conference Paper
    Author : آنیتا فدوی رودسری; جلیل چیتی زاده; سیدسعید حسینی خیاط; Anita Fadavi; Jalil Chitizadeh; Seyed Saied Hosseini Khayat
    Year: 2005
    Abstract:

    To improve the security of Wireless Local Area Networks, the IEEE has recently standardized the 802.11i protocol. The 802.11i is based on two main components. It uses a new protocol, called CCMP for data-confidentiality ...

    The protectors 

    Type: Journal Paper
    Author : Courtney, Martin; Hunter, Philip; Hayes, J.
    Publisher: IET
    Year: 2014

    Network intrusion detection based on neuro-fuzzy classification 

    Type: Conference Paper
    Author : عادل نجاران طوسی; محسن کاهانی; رضا منصفی; Adel Nadjaran Toosi; Mohsen Kahani; Reza Monsefi
    Year: 2006
    Abstract:

    With rapid growth of computer networks during the past few years, network security has become a crucial issue. Among the various network security measures, intrusion detection systems (IDS) play a vital role to integrity, ...

    Adaptive time-domain windowing based transmit power control for TVWS-WLAN systems 

    Type: Conference Paper
    Author : Mizutani, Keiichi; Harada, Hiroshi
    Publisher: IEEE
    Year: 2014

    A New Algorithm for Carry-Free Addition of Binary Signed-Digit Numbers 

    Type: Conference Paper
    Author : Schneider, Klaus , Willenbucher, Adrian
    Publisher: IEEE
    Year: 2014

    Towards an extended tool for analysis of extended feature models 

    Type: Conference Paper
    Author : Achour, I. , Labed, L. , Ben Ghezala, H.
    Publisher: IEEE
    Year: 2014

    Modified Z-source inverter based three phase induction motor drive for solar PV applications 

    Type: Conference Paper
    Publisher: IEEE
    Year: 2014

    Fear of frying electromagnetic weapons threaten our data networks. Here's how to stop them 

    Type: Journal Paper
    Author : Radasky, William
    Publisher: IEEE
    Year: 2014

    Assessing and safeguarding network resilience to nodal attacks 

    Type: Journal Paper
    Author : Pin-Yu Chen; Hero, Alfred O.
    Publisher: IEEE
    Year: 2014

    Workspace mapping and control of a teleoperated endoscopic surgical robot 

    Type: Conference Paper
    Author : Khalifa, Alaa; Ramadan, Ahmed; Ibrahim, Khalil; Fanni, Mohamed; Assal, Samy; Abo-Ismail, Ahmed
    Publisher: IEEE
    Year: 2014
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 42

    Author

    ... View More

    Publisher

    Year

    Keywords

    ... View More

    Type

    Language (ISO)

    Content Type

    Publication Title

    ... View More
    • About Us
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    DSpace software copyright © 2019-2022  DuraSpace