Search results
Appearance
Page title matches
- =NETWORKING DEVICE SECURITY SYSTEM= ==NETWORKING DEVICE SECURITY SYSTEM== ...2 KB (260 words) - 04:09, 24 March 2025
- =NETWORKING DEVICE SECURITY SYSTEM= ==NETWORKING DEVICE SECURITY SYSTEM== ...2 KB (260 words) - 05:04, 24 March 2025
- =Cyber Security Authentication Method for Displayless Networking Device= ==Cyber Security Authentication Method for Displayless Networking Device== ...2 KB (290 words) - 16:29, 11 December 2024
- =Security Systems and Methods for Social Networking= ==Security Systems and Methods for Social Networking - A simplified explanation of the abstract== ...4 KB (574 words) - 10:17, 19 January 2024
- =COGNITIVE AUTOMATION FOR NETWORKING, SECURITY, IoT, AND COLLABORATION= ==COGNITIVE AUTOMATION FOR NETWORKING, SECURITY, IoT, AND COLLABORATION - A simplified explanation of the abstract== ...4 KB (582 words) - 04:02, 23 August 2024
- =SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS= ==SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS== ...2 KB (248 words) - 11:34, 28 April 2025
- =SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS= ==SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS== ...2 KB (248 words) - 12:59, 28 April 2025
Page text matches
- =NETWORKING DEVICE SECURITY SYSTEM= ==NETWORKING DEVICE SECURITY SYSTEM== ...2 KB (260 words) - 04:09, 24 March 2025
- =NETWORKING DEVICE SECURITY SYSTEM= ==NETWORKING DEVICE SECURITY SYSTEM== ...2 KB (260 words) - 05:04, 24 March 2025
- =Cyber Security Authentication Method for Displayless Networking Device= ==Cyber Security Authentication Method for Displayless Networking Device== ...2 KB (290 words) - 16:29, 11 December 2024
- =SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS= ==SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS== ...2 KB (248 words) - 11:34, 28 April 2025
- =SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS= ==SINGLE PANE DISTRIBUTED NETWORKING AND SECURITY FOR BARE METAL AND OVERLAY WORKLOADS== ...2 KB (248 words) - 12:59, 28 April 2025
- =DYNAMIC NETWORKING METHOD, APPARATUS, AND ELECTRONIC DEVICE= ==DYNAMIC NETWORKING METHOD, APPARATUS, AND ELECTRONIC DEVICE - A simplified explanation of the abstract== ...4 KB (542 words) - 04:19, 8 July 2024
- =NETWORKING DEVICE THAT BRIDGES VIRTUAL AND PHYSICAL COMPUTER NETWORKS= ==NETWORKING DEVICE THAT BRIDGES VIRTUAL AND PHYSICAL COMPUTER NETWORKS - A simplified explanation of the abstract== ...4 KB (577 words) - 05:24, 18 July 2024
- =Techniques to Detect Attacks for Time Synchronization Networking= ==Techniques to Detect Attacks for Time Synchronization Networking - A simplified explanation of the abstract== ...4 KB (508 words) - 06:33, 8 August 2024
- =DYNAMIC SECURITY POLICY AND KEY MANAGEMENT FOR CONVERGED NETWORKS= ==DYNAMIC SECURITY POLICY AND KEY MANAGEMENT FOR CONVERGED NETWORKS - A simplified explanation of the abs ...4 KB (469 words) - 05:39, 18 October 2024
- =DOUBLE BLIND PRIVATE WIRELESS LOCAL AREA NETWORKING= ==DOUBLE BLIND PRIVATE WIRELESS LOCAL AREA NETWORKING - A simplified explanation of the abstract== ...3 KB (471 words) - 03:50, 19 September 2024
- =INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM= ==INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - A simplified explanation of the abstract== ...3 KB (483 words) - 06:28, 22 August 2024
- =Security Systems and Methods for Social Networking= ==Security Systems and Methods for Social Networking - A simplified explanation of the abstract== ...4 KB (574 words) - 10:17, 19 January 2024
- =INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM= ==INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - A simplified explanation of the abstract== ...3 KB (495 words) - 02:59, 23 August 2024
- =NETWORKING OVERHEAD REDUCTION FOR ENCRYPTED VIRTUAL MACHINES= ==NETWORKING OVERHEAD REDUCTION FOR ENCRYPTED VIRTUAL MACHINES - A simplified explanatio ...4 KB (515 words) - 07:37, 28 June 2024
- 18491062. METHOD FOR DETERMINING LAYOUT OF ECU simplified abstract (TOYOTA JIDOSHA KABUSHIKI KAISHA)...number of connectors. It also includes assessing the access difficulty and security level of each ECU to optimize the layout of the in-vehicle network. * The layout of ECUs is determined based on wire number and diameter. ...3 KB (488 words) - 03:48, 28 June 2024
- =TRANSPARENT SANITIZATION FOR SYNCHRONIZATION MESSAGES IN TIME SENSITIVE NETWORKING= ==TRANSPARENT SANITIZATION FOR SYNCHRONIZATION MESSAGES IN TIME SENSITIVE NETWORKING - A simplified explanation of the abstract== ...4 KB (514 words) - 05:43, 4 July 2024
- =DYNAMIC SECURITY POLICY AND KEY MANAGEMENT FOR CONVERGED NETWORKS= ==DYNAMIC SECURITY POLICY AND KEY MANAGEMENT FOR CONVERGED NETWORKS - A simplified explanation of the abs ...4 KB (482 words) - 02:52, 18 October 2024
- =ETHERNET FRAME TRANSMISSION METHOD AND COMMUNICATIONS DEVICE= ==ETHERNET FRAME TRANSMISSION METHOD AND COMMUNICATIONS DEVICE - A simplified explanation of the abstract== ...3 KB (356 words) - 03:24, 6 June 2024
- =Router Networking Method and System, Child Router, and Parent Router= ==Router Networking Method and System, Child Router, and Parent Router - A simplified explanation of the abstract== ...4 KB (553 words) - 10:35, 4 January 2024
- =SYSTEMS AND METHODS FOR ADDING NODES TO A NETWORK USING LIGHT-CARRIER ENABLED NETWORK= ==SYSTEMS AND METHODS FOR ADDING NODES TO A NETWORK USING LIGHT-CARRIER ENABLED NETWORK - ...5 KB (684 words) - 08:40, 8 August 2024
(Ad) Transform your business with AI in minutes, not months
✓
Custom AI strategy tailored to your specific industry needs
✓
Step-by-step implementation with measurable ROI
✓
5-minute setup that requires zero technical skills
Trusted by 1,000+ companies worldwide