nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A botnet-based command and control approach relying on swarm intelligence
|
Castiglione, Aniello |
|
2014 |
38 |
C |
p. 22-33 12 p. |
artikel |
2 |
Advanced technologies for homeland defense and security
|
You, Ilsun |
|
2014 |
38 |
C |
p. 1-2 2 p. |
artikel |
3 |
A multi-issued tag key agreement with time constraint for homeland defense sub-department in NFC environment
|
Chen, Hsing-Chung |
|
2014 |
38 |
C |
p. 88-98 11 p. |
artikel |
4 |
An efficient algorithm for scheduling sensor data collection through multi-path routing structures
|
Van Luu, Hai |
|
2014 |
38 |
C |
p. 150-162 13 p. |
artikel |
5 |
An improved side channel attack using event information of subtraction
|
Park, Jong-Yeon |
|
2014 |
38 |
C |
p. 99-105 7 p. |
artikel |
6 |
A semantic authorization model for pervasive healthcare
|
Li, Zang |
|
2014 |
38 |
C |
p. 76-87 12 p. |
artikel |
7 |
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks
|
Lilien, Leszek T. |
|
2014 |
38 |
C |
p. 3-15 13 p. |
artikel |
8 |
A survey on intelligent routing protocols in wireless sensor networks
|
Guo, Wenjing |
|
2014 |
38 |
C |
p. 185-201 17 p. |
artikel |
9 |
A trusted versioning file system for passive mobile storage devices
|
Catuogno, Luigi |
|
2014 |
38 |
C |
p. 65-75 11 p. |
artikel |
10 |
Balancing trajectory privacy and data utility using a personalized anonymization model
|
Gao, Sheng |
|
2014 |
38 |
C |
p. 125-134 10 p. |
artikel |
11 |
Channel assignment in multi-radio wireless mesh networks using an improved gravitational search algorithm
|
Doraghinejad, Mohammad |
|
2014 |
38 |
C |
p. 163-171 9 p. |
artikel |
12 |
Cognitive systems and bio-inspired computing in homeland security
|
Ogiela, Lidia |
|
2014 |
38 |
C |
p. 34-42 9 p. |
artikel |
13 |
Detecting mobile malware threats to homeland security through static analysis
|
Seo, Seung-Hyun |
|
2014 |
38 |
C |
p. 43-53 11 p. |
artikel |
14 |
Editorial board
|
|
|
2014 |
38 |
C |
p. IFC- 1 p. |
artikel |
15 |
Efficient and effective realtime prediction of drive-by download attacks
|
Jayasinghe, Gaya K. |
|
2014 |
38 |
C |
p. 135-149 15 p. |
artikel |
16 |
Enhancement of wireless sensor network lifetime by deploying heterogeneous nodes
|
Halder, Subir |
|
2014 |
38 |
C |
p. 106-124 19 p. |
artikel |
17 |
Low-cost prioritization of image blocks in wireless sensor networks for border surveillance
|
Irgan, Kerem |
|
2014 |
38 |
C |
p. 54-64 11 p. |
artikel |
18 |
Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A review and taxonomy
|
Doudou, Messaoud |
|
2014 |
38 |
C |
p. 172-184 13 p. |
artikel |
19 |
Text analysis for detecting terrorism-related articles on the web
|
Choi, Dongjin |
|
2014 |
38 |
C |
p. 16-21 6 p. |
artikel |