A Security Pattern for a Virtual Private Network
A Security Model for VoIP Steganography
A Security Model for VoIP Steganography
A Security Analysis of the Gnutella Peer-to
A secure routing protocol for ad hoc networks
A Secure Intrusion - Detection System for Vulnerable Attacks in
A Secure Distributed Hash Table - PDOS-MIT
A Scheme for a Guaranteed Minimum Throughput Service
A Schema-Associative Model of Memory
A Scalable, Commodity Data Center Network Architecture
A Scalable Self-organizing Map Algorithm for Textual Classification
A scalable multithreaded L7-filter design for multi
A Scalable Location Service for Geographic Ad Hoc Routing
A scalable file distribution and operating system installation toolkit
A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric
A SAS Procedure for Evaluating the Performance of Token Ring Local Area Networks
A S P
A Routing Underlay for Overlay Networks Department of Computer Science Princeton University
A Routing Protocol for k
A Router`s Functions - Faculty
A Router