Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             17 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks Grana, Justin
2016
66 C p. 166-179
14 p.
artikel
2 An overview of virtual machine placement schemes in cloud computing Masdari, Mohammad
2016
66 C p. 106-127
22 p.
artikel
3 Approaching green sensor field using queue-based optimization technique Jiang, Fuu-Cheng
2016
66 C p. 128-136
9 p.
artikel
4 Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks Mohapatra, Suvendu Kumar
2016
66 C p. 236-249
14 p.
artikel
5 Comparative analysis of cloud data integrity auditing protocols Garg, Neenu
2016
66 C p. 17-32
16 p.
artikel
6 Editorial board 2016
66 C p. IFC-
1 p.
artikel
7 Ensemble based collaborative and distributed intrusion detection systems: A survey Folino, Gianluigi
2016
66 C p. 1-16
16 p.
artikel
8 Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloud Chunlin, Li
2016
66 C p. 250-261
12 p.
artikel
9 HRSPC: a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systems Li, Shiyi
2016
66 C p. 52-63
12 p.
artikel
10 Machine-to-Machine (M2M) communications: A survey Verma, Pawan Kumar
2016
66 C p. 83-105
23 p.
artikel
11 Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysis Phuttharak, Jurairat
2016
66 C p. 137-150
14 p.
artikel
12 Network forensics: Review, taxonomy, and open challenges Khan, Suleman
2016
66 C p. 214-235
22 p.
artikel
13 PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting Qureshi, Amna
2016
66 C p. 180-197
18 p.
artikel
14 Restoring connectivity in a resource constrained WSN Joshi, Yatish K.
2016
66 C p. 151-165
15 p.
artikel
15 Secure routing for internet of things: A survey Airehrour, David
2016
66 C p. 198-213
16 p.
artikel
16 Towards workflow scheduling in cloud computing: A comprehensive analysis Masdari, Mohammad
2016
66 C p. 64-82
19 p.
artikel
17 User context recognition using smartphone sensors and classification models Otebolaku, Abayomi Moradeyo
2016
66 C p. 33-51
19 p.
artikel
                             17 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland