เจ้าของ
แบบดูได้อย่างเดียว
การอัปโหลดและแก้ไข

Security

โดย ted T. 24,552 KB • 35 ไฟล์

แจ้งการใช้ในทางที่ผิด
ดาวน์โหลดเป็น Zip
เพิ่มลงในบัญชีผู้ใช้ของฉัน
 
1ef76a0fd08af0ba6e8d16d0e673be6a.pdf
3-DES.ppt
3-DES.ppt.pdf
4c0ac287bdff07f1a2536028f4f7464a.pdf
4ca.pdf
5bea01f17457a493afd236361d172e3f.pdf
6d025fd63d624b614609a818f2079aa4.pdf
10.1007-s10207-011-0127-4.pdf
34a1ac0f6c324d2b1b45849df75d6046.pdf
57.pdf
443.pdf
578de88b3e1adc935467e1f5b8dc1b94.pdf
1004.3164v1.pdf
1011.1529.pdf
1012.2516.pdf
1012.2516_2.pdf
1101.2759.pdf
1103.3378.pdf
1103.5589.pdf
20406f241c751f36b6bda653fe385536.pdf
352846dcd3d15aed8f0767c11dfef094.pdf
A distributed sinkhole detection method using cluster analysis.pdf
A novel agent-based approach to detect sinkhole attacks in wireless sensor networks.pdf
A trust evaluation framework indistributed networks_ Vulnerability analysis and defense against attacks.pdf
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks.pdf
Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks.pdf
Attack_Types.pdf
e4019faa61ac9dfa254aef5a452a8a98.pdf
Improving security in WMNs with reputation systems and self-organizing maps.pdf
lincrypt.pdf

ตรวจสอบ 30 office ไฟล์ที่แฟ้ม 4shared ของฉัน Security

We Use Cookies. 4shared uses cookies and other tracking technologies to understand where our visitors are coming from and improve your browsing experience on our Website. By using our Website, you consent to our use of cookies and other tracking technologies. Change my preferences
I Agree