Skip to main navigation
Skip to search
Skip to main content
Teesside University's Research Portal Home
Home
Profiles
Research Units
TeesRep
Student theses
Projects
Datasets
Press / Media
Search by expertise, name or affiliation
Case studies in secure computing: Achievements and trends
Biju Issac,
Nauman Israr
Teesside University
Research output
:
Book/Report
›
Book
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Case studies in secure computing: Achievements and trends'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Engineering & Materials Science
Security of data
100%
Fuzzy logic
92%
Mobile computing
89%
Surveying
62%
Application Layer
61%
Denial-of-service attack
61%
Long Term Evolution (LTE)
60%
Network security
57%
Intrusion detection
54%
Decision trees
51%
Cloud computing
46%
Wireless sensor networks
41%
Feature extraction
40%
Network protocols
36%
Set theory
34%