|
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
(Special Topic on Machine Learning for Computer Security).pdf
7 months, 3 weeks
Files: 1 Total size: 268.7 KB Total requests: 522 Last access time: 2 hours, 26 minutes
|
|
Linux Network Administrator's Guide by Olaf Kirch
7 months, 3 weeks
Files: 1 Total size: 1.1 MB Total requests: 213 Last access time: 1 day, 5 hours
|
|
A Jones, Network programming for Microsoft Windows.pdf
8 months, 1 week
Files: 1 Total size: 75.2 MB Total requests: 392 Last access time: 2 days, 2 hours
|
|
Network Your Computers & Devices Step by Step (TRUE PDF)
8 months, 1 week
Files: 1 Total size: 14.0 MB Total requests: 447 Last access time: 1 day, 19 hours
|
Files: 1 Total size: 38.1 MB Total requests: 3452 Last access time: 9 hours, 3 minutes
|
|
Shang T. Secure Quantum Network Coding Theory 2020
8 months, 1 week
Files: 1 Total size: 7.1 MB Total requests: 143 Last access time: 23 hours, 55 minutes
|
|
Di W. Deep Learning Essentials...neural network modeling 2018
8 months, 1 week
Files: 1 Total size: 26.8 MB Total requests: 290 Last access time: 16 hours, 37 minutes
|
|
Chen M. Passive Network Synthesis. Advances with Inerter 2020
8 months, 1 week
Files: 1 Total size: 6.4 MB Total requests: 123 Last access time: 1 week, 4 days
|
|
Forouzan B.A. Introduction to Cryptography and Network Security 2008
8 months, 1 week
Files: 1 Total size: 8.7 MB Total requests: 477 Last access time: 1 day, 19 hours
|
|
West J., Dean T., Andrews J. Network 8ed 2018
8 months, 1 week
Files: 2 Total size: 42.3 MB Total requests: 63 Last access time: 2 weeks
|