Search Results

There are 9186 results for: content related to: Human information security behaviors: Differences across geographies and cultures in a global user survey

  1. Information security issues in higher education and institutional research

    New Directions for Institutional Research

    Volume 2010, Issue 146, Summer 2010, Pages: 23–49, William L. Custer

    Article first published online : 20 JUL 2010, DOI: 10.1002/ir.341

  2. You have free access to this content
    Graphical processing unit-based parallelization of the Open Shortest Path First and Border Gateway Protocol routing protocols

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 1, January 2015, Pages: 237–251, Dejan Dundjerski and Milo Tomašević

    Article first published online : 18 FEB 2014, DOI: 10.1002/cpe.3223

  3. Network QoS

    Handbook of Computer Networks: LANs, MANs, WANs, the Internet, and Global, Cellular, and Wireless Networks, Volume 2

    Hossein Bidgoli, Pages: 417–427, 2011

    Published Online : 29 NOV 2011, DOI: 10.1002/9781118256114.ch28

  4. Will Smart Pricing Finally Take Off?

    Smart Data Pricing

    Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chiang, Pages: 1–33, 2014

    Published Online : 24 OCT 2014, DOI: 10.1002/9781118899250.ch1

  5. You have free access to this content
    Front Matter

    Next Generation Wireless Communications Using Radio over Fiber

    Nathan J. Gomes, Paulo P. Monteiro, Atílio Gameiro, Pages: i–xxix, 2012

    Published Online : 26 AUG 2012, DOI: 10.1002/9781118306017.fmatter

  6. On the performance of using Covert Timing Channels for node authentication

    Security and Communication Networks

    Volume 2, Issue 6, November/December 2009, Pages: 492–506, Reed Newman and Raheem A. Beyah

    Article first published online : 17 DEC 2008, DOI: 10.1002/sec.87

  7. Analysis and modelling of YouTube traffic

    Transactions on Emerging Telecommunications Technologies

    Volume 23, Issue 4, June 2012, Pages: 360–377, Pablo Ameigeiras, Juan J. Ramos-Munoz, Jorge Navarro-Ortiz and J.M. Lopez-Soler

    Article first published online : 26 JUN 2012, DOI: 10.1002/ett.2546

  8. Lightweight enhanced monitoring for high speed networks

    Transactions on Emerging Telecommunications Technologies

    Volume 25, Issue 11, November 2014, Pages: 1095–1113, R. Vilardi, L.A. Grieco, C. Barakat and G. Boggia

    Article first published online : 15 APR 2013, DOI: 10.1002/ett.2637

  9. RA and DA satellite access schemes: a survey and some research results and challenges

    International Journal of Communication Systems

    Volume 27, Issue 11, November 2014, Pages: 2670–2690, N. Celandroni, E. Ferro and A. Gotta

    Article first published online : 14 FEB 2013, DOI: 10.1002/dac.2498

  10. CDN Modeling

    Advanced Content Delivery, Streaming, and Cloud Services

    Tolga Bektaş, Ozgur Ercetin, Pages: 179–202, 2014

    Published Online : 3 OCT 2014, DOI: 10.1002/9781118909690.ch9

  11. The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring

    American Business Law Journal

    Volume 48, Issue 2, Summer 2011, Pages: 285–369, Corey A. Ciocchetti

    Article first published online : 19 MAY 2011, DOI: 10.1111/j.1744-1714.2011.01116.x

  12. On the use of Attribute-Based Encryption for multimedia content protection over Information-Centric Networks

    Transactions on Emerging Telecommunications Technologies

    Volume 25, Issue 4, April 2014, Pages: 422–435, John P. Papanis, Stavros I. Papapanagiotou, Aziz S. Mousas, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris

    Article first published online : 17 OCT 2013, DOI: 10.1002/ett.2722

  13. The Role of Multicast in Congestion Alleviation

    Smart Data Pricing

    Soumya Sen, Carlee Joe-Wong, Sangtae Ha, Mung Chiang, Pages: 441–451, 2014

    Published Online : 24 OCT 2014, DOI: 10.1002/9781118899250.ch17

  14. Life Cycle Assessment of ICT

    Journal of Industrial Ecology

    Volume 18, Issue 6, December 2014, Pages: 829–845, Jens Malmodin, Dag Lundén, Åsa Moberg, Greger Andersson and Mikael Nilsson

    Article first published online : 16 MAY 2014, DOI: 10.1111/jiec.12145

  15. RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2743–2760, Juan Caubet, Oscar Esparza, José L. Muñoz, Juanjo Alins and Jorge Mata-Díaz

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.956

  16. Toward energy-proportional Internet core networks: an energy-minimized routing and virtual topology design for Internet protocol layer

    International Journal of Communication Systems

    Volume 28, Issue 3, February 2015, Pages: 513–533, Yuansheng Wu, Bing Guo, Yan Shen, Jihe Wang and Xiaobin Liu

    Article first published online : 7 OCT 2013, DOI: 10.1002/dac.2684

  17. Reliability in ethernet networks: A survey of various approaches

    Bell Labs Technical Journal

    Volume 11, Issue 3, Autumn (Fall) 2006, Pages: 161–171, Mukul Golash

    Article first published online : 8 NOV 2006, DOI: 10.1002/bltj.20186

  18. You have free access to this content
    References

    Techniques for Surviving the Mobile Data Explosion

    Dinesh Chandra Verma, Paridhi Verma, Pages: 193–198, 2014

    Published Online : 1 MAR 2014, DOI: 10.1002/9781118834404.refs

  19. IP router architectures: an overview

    International Journal of Communication Systems

    Volume 14, Issue 5, June 2001, Pages: 447–475, James Aweya

    Article first published online : 29 MAY 2001, DOI: 10.1002/dac.505

  20. Load Balancing on the Internet

    Standard Article

    The Internet Encyclopedia

    Jianbin Wei, Cheng-Zhong Xu and Xiaobo Zhou

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie109