Skip to main navigation
Skip to search
Skip to main content
Teesside University's Research Portal Home
Home
Profiles
Research units
TeesRep
Student theses
Projects
Datasets
Press/Media
Search by expertise, name or affiliation
Case studies in secure computing: Achievements and trends
Biju Issac,
Nauman Israr
Teesside University
Research output
:
Book/Report
›
Book
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Case studies in secure computing: Achievements and trends'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Security Threats
100%
Secure Computing
100%
Computer Security
50%
Fuzzy Logic
50%
Security Issues
50%
Mobile Security
50%
Security Attacks
50%
Cloud Computing
25%
Intrusion Detection
25%
Feature Selection
25%
Estimation Method
25%
Wireless Sensor Networks
25%
Logic-based
25%
Computing Applications
25%
Security Defense
25%
Resilient Security
25%
Core Network
25%
Long-term Evolution Backhaul
25%
Mobile Computer
25%
Attack Defense
25%
Security Solutions
25%
Robust Security
25%
Multiple Keys
25%
Denial-of-service Attack
25%
Security Countermeasures
25%
Risk Estimation
25%
Application Layer
25%
Wireless Computing
25%
Backhaul Networks
25%
Malicious Behavior
25%
Computing Systems
25%
Mobile Computing Network
25%
Next Generation Computing
25%
Key Establishment Protocol
25%
Decision Tree Model
25%
Illustrative Case Study
25%
Common Elements
25%
Computer Science
Case Study
100%
Computer Security
40%
Security Attack
40%
Fuzzy Mathematics
40%
Best Practice
20%
Intrusion Detection
20%
Feature Selection
20%
Security Challenge
20%
Practical Understanding
20%
Key Establishment
20%
Decision Tree Model
20%
Application Layer
20%
Security Countermeasure
20%
Malicious Activity
20%
Wireless Computing
20%
long-term evolution
20%
Mobile Computing
20%
Security Solution
20%
Network Security
20%
Denial-of-Service
20%
Cloud Computing
20%
Feature Extraction
20%
Wireless Sensor Network
20%