nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive anomaly detection with evolving connectionist systems
|
Liao, Yihua |
|
2007 |
30 |
1 |
p. 60-80 21 p. |
artikel |
2 |
An analytical model for interval caching in interactive video servers
|
Kim, Suneuy |
|
2007 |
30 |
1 |
p. 384-413 30 p. |
artikel |
3 |
A scalable group communication mechanism for mobile agents
|
Jafarpour, Hojjat |
|
2007 |
30 |
1 |
p. 186-208 23 p. |
artikel |
4 |
Design and implementation of Blog Rendering and Accessing INstantly system (BRAINS)
|
Leu, Jenq-Shiou |
|
2007 |
30 |
1 |
p. 296-307 12 p. |
artikel |
5 |
Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol
|
Hongsong, Chen |
|
2007 |
30 |
1 |
p. 145-166 22 p. |
artikel |
6 |
Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
|
Qian, Lijun |
|
2007 |
30 |
1 |
p. 308-330 23 p. |
artikel |
7 |
Distributed middleware architectures for scalable media services
|
Kalogeraki, V. |
|
2007 |
30 |
1 |
p. 209-243 35 p. |
artikel |
8 |
D-SCIDS: Distributed soft computing intrusion detection system
|
Abraham, Ajith |
|
2007 |
30 |
1 |
p. 81-98 18 p. |
artikel |
9 |
Dynamic survivable algorithm for meshed WDM optical networks
|
Guo, Lei |
|
2007 |
30 |
1 |
p. 282-295 14 p. |
artikel |
10 |
Editorial board
|
|
|
2007 |
30 |
1 |
p. CO2- 1 p. |
artikel |
11 |
High-speed routers design using data stream distributor unit
|
Kateeb, Ali El |
|
2007 |
30 |
1 |
p. 133-144 12 p. |
artikel |
12 |
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
|
Özyer, Tansel |
|
2007 |
30 |
1 |
p. 99-113 15 p. |
artikel |
13 |
Intrusion detection using a fuzzy genetics-based learning algorithm
|
Abadeh, M. Saniee |
|
2007 |
30 |
1 |
p. 414-428 15 p. |
artikel |
14 |
Mobile agents for information retrieval in hybrid simulation environment
|
Lu, Tainchi |
|
2007 |
30 |
1 |
p. 244-264 21 p. |
artikel |
15 |
Modeling intrusion detection system using hybrid intelligent systems
|
Peddabachigari, Sandhya |
|
2007 |
30 |
1 |
p. 114-132 19 p. |
artikel |
16 |
Network and information security: A computational intelligence approach
|
Abraham, Ajith |
|
2007 |
30 |
1 |
p. 1-3 3 p. |
artikel |
17 |
Optimized streaming media proxy and its applications
|
Guo, Hui |
|
2007 |
30 |
1 |
p. 265-281 17 p. |
artikel |
18 |
Quality-of-service differentiation on the Internet: A taxonomy
|
Zhou, Xiaobo |
|
2007 |
30 |
1 |
p. 354-383 30 p. |
artikel |
19 |
Real-time network monitoring scheme based on SNMP for dynamic information
|
Shin, Kwang Sik |
|
2007 |
30 |
1 |
p. 331-353 23 p. |
artikel |
20 |
The case for a dynamic proxy framework with voluntary/incentive-based client hosting scheme
|
Choong, Khong Neng |
|
2007 |
30 |
1 |
p. 167-185 19 p. |
artikel |
21 |
The semipublic encryption for visual cryptography using Q’tron neural networks
|
Yue, Tai-Wen |
|
2007 |
30 |
1 |
p. 24-41 18 p. |
artikel |
22 |
Towards secure information sharing using role-based delegation
|
Ahn, Gail-Joon |
|
2007 |
30 |
1 |
p. 42-59 18 p. |
artikel |
23 |
VQ-based watermarking scheme with genetic codebook partition
|
Wang, Feng-Hsing |
|
2007 |
30 |
1 |
p. 4-23 20 p. |
artikel |