Author:
Je Young-Man,You Yen-Yoo,Na Kwan-Sik
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference19 articles.
1. Ojanperä, T., & Mononen, R. (2002). Security and authentication in the mobile world. Wireless Personal Communications, 22(2), 229–235.
2. Saravanan, K., & Senthilkumar, A. (2015). Security enhancement in distributed networks using link-based mapping scheme for network intrusion detection with enhanced bloom filter. Wireless Personal Communications, 64(2), 821–839.
3. Prasad, A., & Kempf, J. (2003). Wireless personal communications special issue on security for next generation communications. Wireless Personal Communications, 26(2–3), 283–284.
4. Feledi, D., Fenz, S., & Lechner, L. (2013). Toward web-based information security knowledge sharing. Information Security Technical Report, 17, 199–209.
5. Kumar, R., & Singh, H. (2012). Analysis of information systems security issues and security techniques. International Journal of Advanced Computer Research, 2(6), 65–68.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Automating Information Security Risk Assessment for IT Services;Communications in Computer and Information Science;2018
2. Convergence Interaction for Communication;Wireless Personal Communications;2016-06-25