Mostrando 4 resultados de: 4
Filtros aplicados
Subtipo de publicación
Article(4)
Publisher
Cluster Computing(1)
International Journal of Applied Engineering Research(1)
Journal of Electronic Testing: Theory and Applications (JETTA)(1)
WSEAS Transactions on Systems(1)
Área temáticas
Ciencias de la computación(3)
Física aplicada(2)
Derecho penal(1)
Fuerzas aéreas y otras fuerzas especializadas(1)
Programación informática, programas, datos, seguridad(1)
DDoS avoidance strategy for service availability
ArticleAbstract: Defending from DDoS attacks have become more difficult because they have evolved in many ways. AbsenPalabras claves:DDoS, security, Service availabilityAutores:Kang S.H., Kim J., Park K.Y., Sang Guun YooFuentes:googlescopusJTAG security system based on credentials
ArticleAbstract: JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments.Palabras claves:authentication, Credential, JTAG, securityAutores:Kim J., Kim T., Park K.Y., Sang Guun YooFuentes:googlescopusPrivacy protection mechanism for indoor positioning systems
ArticleAbstract: Usageoflocation based services in indoor environments has grown as the popularity of smart devices hPalabras claves:indoor positioning system, Location based service, privacy, securityAutores:Kim J., Kim S., Sang Guun YooFuentes:googlescopusSoftware architecture of JTAG security system
ArticleAbstract: The issue of JTAG security has recently become of interest not only to academic researchers but alsoPalabras claves:JTAG, RUP, security, Software architectureAutores:Kim J., Park K.Y., Sang Guun YooFuentes:googlescopus