Skip to main content
guest
Join
|
Help
|
Sign In
maniali
Home
guest
|
Join
|
Help
|
Sign In
Wiki Home
Recent Changes
Pages and Files
Members
Home
About
Calender
Contact
d-POSL
Docs
Emerald
FilesforUpload
Flyerdposl
Generalization
Glossaries
Godel
HornLogic
Interview
jade
jess
Latex
Links
Literature
MobileAgents
Networking
News
Notation3
Note
OO jDREW
Papers
POSL
Posl D-POSL
Presentation
Project
ProjectAgenda
Prolog
Prova
REST
RuleML
RuleRespGuide
ruleresproadmap
SemanticHandbook
SemanticWeb
Sioc
SocialSemanticWeb
Sparql
SPImplementation
SPInstallation
SPInstantiations
Survey
Test
Thesis
calender
emerald
generalizationofsp
glossaries
hornlogic
jade
jess
latex
links
literature
mobileagents
n3
news
oo jdrew
posl
prolog
prova
ruleml
sioc
sparql
Networking
Edit
0
5
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
dekker.pdf
Details
Download
587 KB
A Network Intrusion Detection System with the Snooping Agents.pdf
Details
Download
537 KB
A Comprehensive Online Tool [WR-3] that Detects Security Flaws in Networks.pdf
Details
Download
1 MB
59298016-BackTrack.pdf
Details
Download
264 KB
10.1.1.140.4986.pdf
Details
Download
238 KB
Federated Identity Management.pdf
Details
Download
736 KB
Papers:
Wireless-Network-Behavior-Under-ICMP-Ping-Flood-DoS-Attack-and-Mitigation-Techniques.pdf
Details
Download
518 KB
Security Comparison of Wired and Wireless Network.pdf
Details
Download
307 KB
Performance-analysis-of-wlan.pdf
Details
Download
485 KB
Performance-Analysis-of-Wired-and-Wireless-LAN.pdf
Details
Download
476 KB
Compare Network Simulators.pdf
Details
Download
245 KB
Comparative Throughput of WiFi & Ethernet LANs.pdf
Details
Download
209 KB
CS 5865.pptx
Details
Download
786 KB
CS 5865.pdf
Details
Download
977 KB
OPNET Modeler and Ns Summary.pdf
Details
Download
594 KB
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Papers: