nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Against Signed Graph Deanonymization Attacks on Social Networks
|
Gao, Jianliang |
|
2017 |
47 |
4 |
p. 725-739 |
artikel |
2 |
Analysis for Behavioral Economics in Social Networks: An Altruism-Based Dynamic Cooperation Model
|
Li, Deng |
|
2018 |
47 |
4 |
p. 686-708 |
artikel |
3 |
An Intrusion Detection Framework Based on Hybrid Multi-Level Data Mining
|
Yao, Haipeng |
|
2017 |
47 |
4 |
p. 740-758 |
artikel |
4 |
A Novel Auction-Based Query Pricing Schema
|
Wang, Xingwang |
|
2017 |
47 |
4 |
p. 759-780 |
artikel |
5 |
BlockGraphChi: Enabling Block Update in Out-of-Core Graph Processing
|
Shao, Zhiyuan |
|
2017 |
47 |
4 |
p. 668-685 |
artikel |
6 |
Covert Timing Channels Exploiting Cache Coherence Hardware: Characterization and Defense
|
Yao, Fan |
|
2018 |
47 |
4 |
p. 595-620 |
artikel |
7 |
Editorial: Special Issue on Side-Channel and Fault Analysis of High-Performance Computing Platforms
|
Ghalaty, Nahid Farhady |
|
2019 |
47 |
4 |
p. 535-537 |
artikel |
8 |
Guest Editorial: Special Issue on Algorithms and Systems on Big Graph Processing
|
Hua, Qiang-Sheng |
|
2019 |
47 |
4 |
p. 641-643 |
artikel |
9 |
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
|
Moghimi, Ahmad |
|
2018 |
47 |
4 |
p. 538-570 |
artikel |
10 |
Memory Tampering Attack on Binary GCD Based Inversion Algorithms
|
Aldaya, Alejandro Cabrera |
|
2018 |
47 |
4 |
p. 621-640 |
artikel |
11 |
PrODACT: Prefetch-Obfuscator to Defend Against Cache Timing Channels
|
Fang, Hongyu |
|
2018 |
47 |
4 |
p. 571-594 |
artikel |
12 |
Soundness Analytics of Composed Logical Workflow Nets
|
Liu, Wei |
|
2017 |
47 |
4 |
p. 709-724 |
artikel |
13 |
WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU
|
Zhu, Huanzhou |
|
2017 |
47 |
4 |
p. 644-667 |
artikel |