Advances in Networks, Computing and Communications 4Lulu.com, 2007 |
Inhoudsopgave
An investigation on the relationship of aggregated TCP and UDP traffic M Davy and B V Ghita | 19 |
Analysis of EndtoEnd Techniques for Bottleneck Bandwidth Path | 38 |
Public awareness of biometrics K Evangelatos and S M Furnell | 51 |
Investigate Placement of Relaying Node in Wireless Mesh Networks | 72 |
WebBased Risk Analysis and Education for Home Users | 89 |
Security Considerations for a Wireless Local Area Network | 106 |
Evaluation of Grid Computing Security | 123 |
A Performance of network coding in randomised settings | 130 |
Improving protection and security awareness amongst home users | 182 |
User security awareness of social engineering and phishing | 191 |
Evaluating the Perceptions of People towards Online Security | 199 |
Intrusion Detection System for mobile devices | 205 |
Keystroke analysis as an authentication method for thumbbased keyboards | 213 |
Strengthening the Human Firewall | 222 |
Computing Robotics Interactive Intelligent | 231 |
eGovernment takeup in the city of Plymouth UK | 247 |
Investigation on Static Network with Network Coding | 138 |
A guide for small and medium enterprise of implementing security and | 146 |
Information Systems Security | 155 |
Why are they not used correctly? | 164 |
Webbased Plankton Data Visualisation | 173 |
G Ford and A D Phippen | 255 |
a case study using the Evolution | 264 |
Information systems integration in virtual learning environments | 273 |
a neural network pruning approach | 286 |
Author Index | 294 |
Veelvoorkomende woorden en zinsdelen
achieved algorithm analysis applications approach asked attacks authentication average awareness bandwidth biometrics bottleneck capacity communication connection considered created database designed detection developed devices effective emotions example existing experiment fact Figure findings firewall function grid healthcare systems identify implemented important improve included increase indicate Internet intonation issues knowledge majority means method mobile monitoring network coding network monitoring packets participants password patterns performance Plymouth points presented problem protection Protocol questions receiver recognition relaying node respondents risk robots server shows simulation specific speech Spyware survey Table techniques technologies threats throughput tool traffic understanding University users values voice VoIP wireless