hrcak mascot   Srce   HID

Editorial

Guest Editorial

Hong Zhao ; Fairleigh Dickinson University, NJ, USA
Kevin Kwiat ; Air Force Research Laboratory, USA

Fulltext: english, pdf (82 KB) pages III-IV downloads: 180* cite
APA 6th Edition
Zhao, H. & Kwiat, K. (2015). Guest Editorial. Journal of computing and information technology, 23 (4), III-IV. Retrieved from https://hrcak.srce.hr/149734
MLA 8th Edition
Zhao, Hong and Kevin Kwiat. "Guest Editorial." Journal of computing and information technology, vol. 23, no. 4, 2015, pp. III-IV. https://hrcak.srce.hr/149734. Accessed 19 Apr. 2021.
Chicago 17th Edition
Zhao, Hong and Kevin Kwiat. "Guest Editorial." Journal of computing and information technology 23, no. 4 (2015): III-IV. https://hrcak.srce.hr/149734
Harvard
Zhao, H., and Kwiat, K. (2015). 'Guest Editorial', Journal of computing and information technology, 23(4), pp. III-IV. Available at: https://hrcak.srce.hr/149734 (Accessed 19 April 2021)
Vancouver
Zhao H, Kwiat K. Guest Editorial. Journal of computing and information technology [Internet]. 2015 [cited 2021 April 19];23(4):III-IV. Available from: https://hrcak.srce.hr/149734
IEEE
H. Zhao and K. Kwiat, "Guest Editorial", Journal of computing and information technology, vol.23, no. 4, pp. III-IV, 2015. [Online]. Available: https://hrcak.srce.hr/149734. [Accessed: 19 April 2021]

Abstracts
Network security is a continuing endeavor as exhibited by this special issue on the subject. Although the problem of securing networks emerged almost simultaneously with their development, attaining a fixed set of complete solutions remains evasive. In the history of the development of computers and networking, solutions to challenging problems have become touchstones, and from among them we can draw a parallel to the current state of network development.

Keywords
editorial; CIT; network security

Hrčak ID: 149734

URI
https://hrcak.srce.hr/149734

Visits: 306 *