Network of PCs as high-performance servers: requirements for a communication mechanism

K Li - Proceedings of Massively Parallel Processing Using …, 1996 - ieeexplore.ieee.org
Networks of commodity PCs have the potential to provide extremely cost-effective computing
and information services. However, they will fulfil their promise only if their system …

[引用][C] Ağ iletişiminde veri gizleme tabanlı bilgi güvenliği uygulamaları

İ Karadoğan - 2016 - platform.almanhal.com
Al Manhal Platform The session has been expired. Please reload the page Reload Please
wait... The file is being prepared Preview Mode If you would like full access to this publication …

[引用][C] Review of Network Steganography Techniques

A Asrani, V Koul, R Khot - … Engineering College, Mumbai, Imperial Journal of …, 2016

[引用][C] A NEW APPROACH FOR DETECTING MALICIOUS CHANNELS IN THE NETWORKS

S Rafi, B Swanth, B Suresh

[引用][C] Notice of Removal: The Solution of Key Transmission in Multi-level Network Steganography

P Xue, J Hu, R Hu, Y Wang - 2018 International Computers …, 2018 - ieeexplore.ieee.org
Removed.

[引用][C] Data Protection Using Digital Watermarking

KK Kaswan, R Lal

[引用][C] Defending Computer Networks from Covert Operations using Chaos Theory

MV Bharadwaj, AVSS Rao