1,985 results on '"Gurtov, A."'
Search Results
152. Overview of 5G Security Challenges and Solutions.
153. Population Migration for the Development of the Russian Arctic: Features and Capabilities
154. The Transformation of Socialism
155. The Transformation of Socialism
156. 6G White paper: Research challenges for Trust, Security and Privacy.
157. A lightweight portable intrusion detection communication system for auditing applications.
158. On the Resiliency of Randomized Routing Against Multiple Edge Failures.
159. New concepts for traffic, resource and mobility management in software-defined mobile networks.
160. Improving the tunnel management performance of secure VPLS architectures with SDN.
161. Performance and security evaluation of intra-vehicular communication architecture.
162. The quest for resilient (static) forwarding tables.
163. NFV security considerations for cloud-based mobile virtual network operators.
164. Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques.
165. Secure and Efficient Automatic Ruling in Three-Level Network Architecture
166. Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques
167. Cease-fire Agreements in the Middle East Seem More Remote than Ever.
168. Forecasting the Economic Need for Personnel with Higher Scientific Qualifications
169. Cyclic ranking in single-resource peer-to-peer exchange
170. CR-Chord
171. Commercial Applications
172. Adaptable Overlay Network Topology
173. Indirection Infrastructures
174. Hierarchical DHT Architectures
175. Diophantine Routing
176. Local Ranking
177. Cyclic Routing
178. Structural Ranking
179. Clustering
180. Hierarchical Neighbor Maintenance
181. Flat DHT Routing Topologies
182. Terminology, Problems, and Design Issues
183. Security of Satellite-Terrestrial Communications
184. Professional development of candidates of sciences who have defended dissertations in the priority areas of the Strategy for the Scientific and Technological Development of the Russian Federation
185. Recruitment needs of the Russian Arctic economy: Future outlook
186. Evidence for deliberate burial of the dead by Homo naledi
187. Evidence for deliberate burial of the dead byHomo naledi
188. South Korea's Foreign Policy and Future Security: Implications of the Nuclear Standoff
189. Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes
190. Anonymous Secure Framework in Connected Smart Home Environments.
191. Smart Spaces-Based Application Development: M3 Architecture, Design Principles, Use Cases, and Evaluation.
192. Nash Bargaining Solution Allocation is Not Suitable for Datacenter Jobs.
193. CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
194. On the Resiliency of Static Forwarding Tables.
195. Secure communication channel architecture for Software Defined Mobile Networks.
196. Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems.
197. A Simulation Study of the Stochastic Compensation Effect for Packet Reordering in Multipath Data Streaming.
198. Secure and Efficient Automatic Ruling in Three-Level Network Architecture.
199. Leveraging LTE security with SDN and NFV.
200. Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.