http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이 학술지의 논문 검색
Gurbani, V. K.; McGee, A. R. John Wiley & Sons, Ltd 2007 p.7-19
Building secure products and solutions
Gupta, A. K.; Chandrashekhar, U.; Sabnis, S. V.; Bastry, F. A. John Wiley & Sons, Ltd 2007 p.21-38
McGee, A. R.; Bastry, F. A.; Chandrashekhar, U.; Vasireddy, S. R.; Flynn, L. A. John Wiley & Sons, Ltd 2007 p.39-54
Case study: ITU-T recommendation X.805 applied to an enterprise environment-banking
Ramirez, D. John Wiley & Sons, Ltd 2007 p.55-64
Comparing reliability and security: Concepts, requirements, and techniques
Hanmer, R. S.; McBride, D. T.; Mendiratta, V. B. John Wiley & Sons, Ltd 2007 p.65-78
An XML-based testing strategy for probing security vulnerabilities in the diameter protocol
Wang, D. John Wiley & Sons, Ltd 2007 p.79-93
IP-based radio access network implementation cost vs. network security trade-off
Park, S.; Salvarani, A. John Wiley & Sons, Ltd 2007 p.95-99
Evros: A service-delivery platform for extending security coverage and IT reach
Stiliadis, D.; Francini, A.; Kamat, S.; Alicherry, M.; Hari, A.; Koppol, P. V.; Gupta, A. K.; Skuler, D. John Wiley & Sons, Ltd 2007 p.101-119
The need for a multi-perspective approach to solve the DDos problem
Hernandez-Herrero, J.; Solworth, J. A. John Wiley & Sons, Ltd 2007 p.121-130