Literatura académica sobre el tema "ILLEGITIMATE SERVER"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "ILLEGITIMATE SERVER".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "ILLEGITIMATE SERVER"
Jan, Saeed Ullah y Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis". Network and Communication Technologies 3, n.º 1 (26 de abril de 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.
Texto completoRazaque, Abdul y Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment". Journal of Communications and Computer Engineering 3, n.º 1 (13 de octubre de 2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.
Texto completoBrindha, K. y N. Jeyanthi. "Secured Document Sharing Using Visual Cryptography in Cloud Data Storage". Cybernetics and Information Technologies 15, n.º 4 (1 de noviembre de 2015): 111–23. http://dx.doi.org/10.1515/cait-2015-0058.
Texto completoChao, Han-Chieh, Hsin-Te Wu y Fan-Hsun Tseng. "AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing". Sustainability 13, n.º 6 (10 de marzo de 2021): 3048. http://dx.doi.org/10.3390/su13063048.
Texto completoHaruna, Saibu Aliyu, Raphael Olufemi Akinyede y Boyinbode Olutayo Kehinde. "NEURO-FUZZY DATA MINING SYSTEM FOR IDENTIFYING E-COMMERCE RELATED THREATS". MALAYSIAN JOURNAL OF COMPUTING 5, n.º 2 (9 de septiembre de 2020): 537. http://dx.doi.org/10.24191/mjoc.v5i2.8642.
Texto completoPeriyasamy, A. R. Pon. "Security Issues of Firewall". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 7 (30 de julio de 2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.
Texto completoRazaque, Abdul, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat y Aziz Alotaibi. "Big Data Handling Approach for Unauthorized Cloud Computing Access". Electronics 11, n.º 1 (3 de enero de 2022): 137. http://dx.doi.org/10.3390/electronics11010137.
Texto completoPurwoleksono, Didik Endro. "THE APPLICABILITY OF ARTICLE 4 OF ANTI-CORRUPTION LAW AND THE THEORY OF TORT". Yuridika 34, n.º 1 (1 de enero de 2019): 21. http://dx.doi.org/10.20473/ydk.v34i1.7552.
Texto completoLewin, Linda. "Natural and Spurious Children in Brazilian Inheritance Law From Colony to Empire: A Methodological Essay". Americas 48, n.º 3 (enero de 1992): 351–96. http://dx.doi.org/10.2307/1007241.
Texto completoBoulton, S. J. y S. P. Jackson. "Saccharomyces cerevisiae Ku70 potentiates illegitimate DNA double-strand break repair and serves as a barrier to error-prone DNA repair pathways." EMBO Journal 15, n.º 18 (septiembre de 1996): 5093–103. http://dx.doi.org/10.1002/j.1460-2075.1996.tb00890.x.
Texto completoTesis sobre el tema "ILLEGITIMATE SERVER"
DHAMA, VIKRANT. "ANALYZING SECURITY BREACH AND DATA LEAKAGE IN MOBILE APPLICATIONS USING ILLEGITIMATE SERVER CONNECTIONS". Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15024.
Texto completoLibros sobre el tema "ILLEGITIMATE SERVER"
Bernhardt, Elizabeth Louise. Genevra Sforza and the Bentivoglio. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463726849.
Texto completoAndrade, Nathanael. Civil War. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190638818.003.0009.
Texto completoVarol, Ozan O. The Enemy Within. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0012.
Texto completoOkeke, Edward Chukwuemeke. Conclusion. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190611231.003.0011.
Texto completoBergeron, David M. The Duke of Lennox, 1574-1624. Edinburgh University Press, 2022. http://dx.doi.org/10.3366/edinburgh/9781399500449.001.0001.
Texto completoDelmas, Candice. Justice and Democracy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190872199.003.0004.
Texto completoGleave, Robert y István Kristó-Nagy, eds. Violence in Islamic Thought from the Qur'an to the Mongols. Edinburgh University Press, 2015. http://dx.doi.org/10.3366/edinburgh/9780748694235.001.0001.
Texto completoZola, Émile. The Fortune of the Rougons. Traducido por Brian Nelson. Oxford University Press, 2012. http://dx.doi.org/10.1093/owc/9780199560998.001.0001.
Texto completoCollins, Wilkie. The Dead Secret. Editado por Ira B. Nadel. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536719.001.0001.
Texto completoCapítulos de libros sobre el tema "ILLEGITIMATE SERVER"
Dalai, Asish Kumar y Sanjay Kumar Jena. "Online Identification of Illegitimate Web Server Requests". En Communications in Computer and Information Science, 123–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_15.
Texto completoSwami, Rochak, Mayank Dave y Virender Ranga. "DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN". En Research Anthology on Combating Denial-of-Service Attacks, 248–64. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch013.
Texto completoSwami, Rochak, Mayank Dave y Virender Ranga. "DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN". En Security and Privacy Issues in Sensor Networks and IoT, 193–214. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch008.
Texto completoDaci, Genti y Rezarta Jaupi. "IP Layer Client Puzzles". En Enterprise Business Modeling, Optimization Techniques, and Flexible Information Systems, 14–25. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3946-1.ch002.
Texto completoMac Amhlaigh, Cormac S. "What’s Wrong with Constitutionalism? Between Cacophony and Coercion". En New Constitutional Horizons, 134—C6.N117. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198852339.003.0006.
Texto completoLenowitz, Jeffrey A. "Ratification beyond (and before) Constitutions". En Constitutional Ratification without Reason, 40–63. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780198852346.003.0002.
Texto completoSowjanya, K. K., K. P. B. Madavi y G. Thahniyath. "Preserving the Privacy of Wearable IoT Device Data Using Blockchain". En Blockchain Applications in Cybersecurity Solutions, 97–116. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815080599123010009.
Texto completoRai, Mridu. "Kashmiris in the Hindu Rashtra". En Majoritarian State, 259–80. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190078171.003.0015.
Texto completoJackson, Emily. "9. Genetic Information". En Medical Law, 470–505. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198825845.003.0009.
Texto completoGrant, Ruth W. "Ethical and Not So Ethical Incentives". En Strings Attached. Princeton University Press, 2011. http://dx.doi.org/10.23943/princeton/9780691151601.003.0004.
Texto completoActas de conferencias sobre el tema "ILLEGITIMATE SERVER"
Gill, Grandon. "The Predatory Journal: Victimizer or Victim?" En InSITE 2021: Informing Science + IT Education Conferences. Informing Science Institute, 2021. http://dx.doi.org/10.28945/4780.
Texto completoLauc, Zvonimir y Marijana Majnarić. "EU LEGAL SYSTEM AND CLAUSULA REBUS SIC STANTIBUS". En EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18352.
Texto completo