nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A collaborative framework for intrusion detection in mobile networks
|
Andreolini, Mauro |
|
2015 |
321 |
C |
p. 179-192 14 p. |
artikel |
2 |
A multi-objective evolutionary algorithm for the tuning of fuzzy rule bases for uncoordinated intersections in autonomous driving
|
Onieva, E. |
|
2015 |
321 |
C |
p. 14-30 17 p. |
artikel |
3 |
A non-uniform multi-rate control strategy for a Markov chain-driven Networked Control System
|
Cuenca, Ángel |
|
2015 |
321 |
C |
p. 31-47 17 p. |
artikel |
4 |
A novel consumer-centric card management architecture and potential security issues
|
Akram, Raja Naeem |
|
2015 |
321 |
C |
p. 150-161 12 p. |
artikel |
5 |
A provable authenticated group key agreement protocol for mobile environment
|
Sun, Hung-Min |
|
2015 |
321 |
C |
p. 224-237 14 p. |
artikel |
6 |
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
|
He, Debiao |
|
2015 |
321 |
C |
p. 263-277 15 p. |
artikel |
7 |
Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels
|
(William) Chin, Wen-Long |
|
2015 |
321 |
C |
p. 238-249 12 p. |
artikel |
8 |
Common influence region problems
|
Fort, M. |
|
2015 |
321 |
C |
p. 116-135 20 p. |
artikel |
9 |
Detection of copy–move image forgery using histogram of orientated gradients
|
Lee, Jen-Chun |
|
2015 |
321 |
C |
p. 250-262 13 p. |
artikel |
10 |
Identity-based quotable ring signature
|
Wang, Kefeng |
|
2015 |
321 |
C |
p. 71-89 19 p. |
artikel |
11 |
Inside Front Cover - Editorial Board
|
|
|
2015 |
321 |
C |
p. IFC- 1 p. |
artikel |
12 |
Note on distance measure of hesitant fuzzy sets
|
Li, Deqing |
|
2015 |
321 |
C |
p. 103-115 13 p. |
artikel |
13 |
On learning of weights through preferences
|
Aggarwal, Manish |
|
2015 |
321 |
C |
p. 90-102 13 p. |
artikel |
14 |
Optimality conditions for generalized differentiable interval-valued functions
|
Osuna-Gómez, R. |
|
2015 |
321 |
C |
p. 136-146 11 p. |
artikel |
15 |
Participatory Learner Modelling Design: A methodology for iterative learner models development
|
Cocea, Mihaela |
|
2015 |
321 |
C |
p. 48-70 23 p. |
artikel |
16 |
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
|
Wang, Ding |
|
2015 |
321 |
C |
p. 162-178 17 p. |
artikel |
17 |
Probabilistic receiver-location privacy protection in wireless sensor networks
|
Rios, Ruben |
|
2015 |
321 |
C |
p. 205-223 19 p. |
artikel |
18 |
Security and privacy information technologies and applications for wireless pervasive computing environments
|
Wang, Shiuh-Jeng |
|
2015 |
321 |
C |
p. 147-149 3 p. |
artikel |
19 |
Simple and effective method for detecting abnormal internet behaviors of mobile devices
|
Chen, Patrick Shicheng |
|
2015 |
321 |
C |
p. 193-204 12 p. |
artikel |
20 |
Visualizing network communities with a semi-definite programming method
|
Li, Wenye |
|
2015 |
321 |
C |
p. 1-13 13 p. |
artikel |