nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cyber-physical experimentation environment for the security analysis of networked industrial control systems
|
Genge, Béla |
|
2012 |
38 |
5 |
p. 1146-1161 16 p. |
artikel |
2 |
A framework for establishing trust in the Cloud
|
Abbadi, Imad M. |
|
2012 |
38 |
5 |
p. 1073-1087 15 p. |
artikel |
3 |
A high capacity and strong robust fingerprinting for compressed images
|
Li, Xinwei |
|
2012 |
38 |
5 |
p. 1249-1261 13 p. |
artikel |
4 |
A RGB image encryption algorithm based on DNA encoding and chaos map
|
Liu, Lili |
|
2012 |
38 |
5 |
p. 1240-1248 9 p. |
artikel |
5 |
A systematic gradient-based method for the computation of fingerprint’s orientation field
|
Mei, Yuan |
|
2012 |
38 |
5 |
p. 1035-1046 12 p. |
artikel |
6 |
Automatic network intrusion detection: Current techniques and open issues
|
Catania, Carlos A. |
|
2012 |
38 |
5 |
p. 1062-1072 11 p. |
artikel |
7 |
Automatic recognition vision system guided for apple harvesting robot
|
Ji, Wei |
|
2012 |
38 |
5 |
p. 1186-1195 10 p. |
artikel |
8 |
Corner turn of SAR data based on multi-FPGAs parallel system
|
Shen, Huanghui |
|
2012 |
38 |
5 |
p. 1205-1212 8 p. |
artikel |
9 |
Definition of response metrics for an ontology-based Automated Intrusion Response Systems
|
Mateos, Verónica |
|
2012 |
38 |
5 |
p. 1102-1114 13 p. |
artikel |
10 |
Design and VLSI implementation of a high-performance face detection engine
|
Han, Dongil |
|
2012 |
38 |
5 |
p. 1222-1239 18 p. |
artikel |
11 |
Editorial Board
|
|
|
2012 |
38 |
5 |
p. IFC- 1 p. |
artikel |
12 |
Efficient parallel architecture for multi-level forward discrete wavelet transform processors
|
Aziz, Syed Mahfuzul |
|
2012 |
38 |
5 |
p. 1325-1335 11 p. |
artikel |
13 |
Efficient registration of optical and infrared images via modified Sobel edging for plant canopy temperature estimation
|
Yang, Weiping |
|
2012 |
38 |
5 |
p. 1213-1221 9 p. |
artikel |
14 |
From single watermark to dual watermark: A new approach for image watermarking
|
Shen, Hong |
|
2012 |
38 |
5 |
p. 1310-1324 15 p. |
artikel |
15 |
Human typical action recognition using gray scale image of silhouette sequence
|
Huang, Bin |
|
2012 |
38 |
5 |
p. 1177-1185 9 p. |
artikel |
16 |
ICTEDCT-CBIR: Integrating curvelet transform with enhanced dominant colors extraction and texture analysis for efficient content-based image retrieval
|
Youssef, Sherin M. |
|
2012 |
38 |
5 |
p. 1358-1376 19 p. |
artikel |
17 |
Image super-resolution by dictionary concatenation and sparse representation with approximate L 0 norm minimization
|
Lu, Jinzheng |
|
2012 |
38 |
5 |
p. 1336-1345 10 p. |
artikel |
18 |
Introduction to Recent Advances in Security and Privacy in Distributed Communications
|
Martínez, Gregorio |
|
2012 |
38 |
5 |
p. 1033-1034 2 p. |
artikel |
19 |
Introduction to Special Issue on Image Processing
|
Sahin, Ferat |
|
2012 |
38 |
5 |
p. 1162-1163 2 p. |
artikel |
20 |
Localized discriminative scale invariant feature transform based facial expression recognition
|
Soyel, Hamit |
|
2012 |
38 |
5 |
p. 1299-1309 11 p. |
artikel |
21 |
Local Upsampling Fourier Transform for accurate 2D/3D image registration
|
Wang, Cailing |
|
2012 |
38 |
5 |
p. 1346-1357 12 p. |
artikel |
22 |
Mitigation of DHCP starvation attack
|
Mukhtar, Husameldin |
|
2012 |
38 |
5 |
p. 1115-1128 14 p. |
artikel |
23 |
Modeling access control for cyber-physical systems using reputation
|
Chen, Dong |
|
2012 |
38 |
5 |
p. 1088-1101 14 p. |
artikel |
24 |
On protection of compressed image in fading channel using data hiding
|
Phadikar, Amit |
|
2012 |
38 |
5 |
p. 1278-1298 21 p. |
artikel |
25 |
Pulse quarantine strategy of internet worm propagation: Modeling and analysis
|
Yao, Yu |
|
2012 |
38 |
5 |
p. 1047-1061 15 p. |
artikel |
26 |
Robust gray-scale logo watermarking in wavelet domain
|
Bhatnagar, Gaurav |
|
2012 |
38 |
5 |
p. 1164-1176 13 p. |
artikel |
27 |
Shock coupled fourth-order diffusion for image enhancement
|
Jidesh, P. |
|
2012 |
38 |
5 |
p. 1262-1277 16 p. |
artikel |
28 |
Toggle and top-hat based morphological contrast operators
|
Bai, Xiangzhi |
|
2012 |
38 |
5 |
p. 1196-1204 9 p. |
artikel |
29 |
Zero Configuration Networking: Implementation, performance, and security
|
Siddiqui, Farhan |
|
2012 |
38 |
5 |
p. 1129-1145 17 p. |
artikel |