Suchergebnisse - "Networks Network protocols Network layer protocols Routing protocols"
-
1
Autoren: et al.
Quelle: Journal of Cybersecurity & Privacy; Sep2024, Vol. 4 Issue 3, p410-448, 39p
Schlagwörter: PENETRATION testing (Computer security), SOURCE code, COMPUTER software, CLASSIFICATION, SURVEYS
-
2
Autoren:
Quelle: South African Computer Journal; Dec2023, Vol. 35 Issue 2, p3-24, 22p
-
3
Autoren:
Quelle: Journal of Computing & Information Technology; 2018, Vol. 26 Issue 4, p251-265, 15p
-
4
Autoren:
Quelle: Journal of Computing & Information Technology; 2018, Vol. 26 Issue 1, p7-17, 11p
-
5
Autoren:
Quelle: Journal of Computing & Information Technology; 2017, Vol. 25 Issue 1, p15-29, 15p
-
6
Autoren:
Quelle: Journal of Computing & Information Technology; Sep2016, Vol. 24 Issue 3, p221-235, 15p
-
7
Autoren:
Quelle: Journal of Computing & Information Technology; Sep2016, Vol. 24 Issue 3, p209-220, 12p
Full Text Finder
Nájsť tento článok vo Web of Science