nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks
|
Grana, Justin |
|
2016 |
66 |
C |
p. 166-179 14 p. |
artikel |
2 |
An overview of virtual machine placement schemes in cloud computing
|
Masdari, Mohammad |
|
2016 |
66 |
C |
p. 106-127 22 p. |
artikel |
3 |
Approaching green sensor field using queue-based optimization technique
|
Jiang, Fuu-Cheng |
|
2016 |
66 |
C |
p. 128-136 9 p. |
artikel |
4 |
Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks
|
Mohapatra, Suvendu Kumar |
|
2016 |
66 |
C |
p. 236-249 14 p. |
artikel |
5 |
Comparative analysis of cloud data integrity auditing protocols
|
Garg, Neenu |
|
2016 |
66 |
C |
p. 17-32 16 p. |
artikel |
6 |
Editorial board
|
|
|
2016 |
66 |
C |
p. IFC- 1 p. |
artikel |
7 |
Ensemble based collaborative and distributed intrusion detection systems: A survey
|
Folino, Gianluigi |
|
2016 |
66 |
C |
p. 1-16 16 p. |
artikel |
8 |
Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloud
|
Chunlin, Li |
|
2016 |
66 |
C |
p. 250-261 12 p. |
artikel |
9 |
HRSPC: a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systems
|
Li, Shiyi |
|
2016 |
66 |
C |
p. 52-63 12 p. |
artikel |
10 |
Machine-to-Machine (M2M) communications: A survey
|
Verma, Pawan Kumar |
|
2016 |
66 |
C |
p. 83-105 23 p. |
artikel |
11 |
Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysis
|
Phuttharak, Jurairat |
|
2016 |
66 |
C |
p. 137-150 14 p. |
artikel |
12 |
Network forensics: Review, taxonomy, and open challenges
|
Khan, Suleman |
|
2016 |
66 |
C |
p. 214-235 22 p. |
artikel |
13 |
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting
|
Qureshi, Amna |
|
2016 |
66 |
C |
p. 180-197 18 p. |
artikel |
14 |
Restoring connectivity in a resource constrained WSN
|
Joshi, Yatish K. |
|
2016 |
66 |
C |
p. 151-165 15 p. |
artikel |
15 |
Secure routing for internet of things: A survey
|
Airehrour, David |
|
2016 |
66 |
C |
p. 198-213 16 p. |
artikel |
16 |
Towards workflow scheduling in cloud computing: A comprehensive analysis
|
Masdari, Mohammad |
|
2016 |
66 |
C |
p. 64-82 19 p. |
artikel |
17 |
User context recognition using smartphone sensors and classification models
|
Otebolaku, Abayomi Moradeyo |
|
2016 |
66 |
C |
p. 33-51 19 p. |
artikel |