Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             35 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network Bounouni, Mahdi
2018
74 10 p. 5373-5398
artikel
2 A hybrid data replication strategy with fuzzy-based deletion for heterogeneous cloud data centers Mansouri, N.
2018
74 10 p. 5349-5372
artikel
3 A low cost wearable wireless sensing system for paretic hand management after stroke Min, Se-Dong
2016
74 10 p. 5231-5240
artikel
4 A machine learning approach for feature selection traffic classification using security analysis Shafiq, Muhammad
2018
74 10 p. 4867-4892
artikel
5 An efficient approach for publishing microdata for multiple sensitive attributes Anjum, Adeel
2018
74 10 p. 5127-5155
artikel
6 An optimization framework for the capacity allocation and admission control of MapReduce jobs in cloud systems Malekimajd, M.
2018
74 10 p. 5314-5348
artikel
7 A security review of local government using NIST CSF: a case study Ibrahim, Ahmed
2018
74 10 p. 5171-5186
artikel
8 A stochastic link-fault-tolerant routing algorithm in folded hypercubes Thuan, Bui Thi
2018
74 10 p. 5539-5557
artikel
9 CDCSS: cluster-based distributed cooperative spectrum sensing model against primary user emulation (PUE) cyber attacks Mirza, Muhammad Ayzed
2018
74 10 p. 5082-5098
artikel
10 Chain-based big data access control infrastructure Sifah, Emmanuel Boateng
2018
74 10 p. 4945-4964
artikel
11 Confidential smart-sensing framework in the IoT era Al-Turjman, Fadi
2018
74 10 p. 5187-5198
artikel
12 Continuous memory allocation model for cloud services Alyatama, Anwar
2018
74 10 p. 5513-5538
artikel
13 CWBound: boundary node detection algorithm for complex non-convex mobile ad hoc networks Cheong, Se-Hang
2018
74 10 p. 5558-5577
artikel
14 Cyber security methods for aerial vehicle networks: taxonomy, challenges and solution Sedjelmaci, Hichem
2018
74 10 p. 4928-4944
artikel
15 Design of DRAM-NAND flash hybrid main memory and Q-learning-based prefetching method Yoon, Su-Kyung
2018
74 10 p. 5293-5313
artikel
16 ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures Yang, Wencheng
2018
74 10 p. 4893-4909
artikel
17 E-OSched: a load balancing scheduler for heterogeneous multicores Khalid, Yasir Noman
2018
74 10 p. 5399-5431
artikel
18 Forensic investigation to detect forgeries in ASF files of contemporary IP cameras Khan, Rashid Masood
2018
74 10 p. 5060-5081
artikel
19 Identifying critical autonomous systems in the Internet Nur, Abdullah Yasin
2018
74 10 p. 4965-4985
artikel
20 Improving NMF-based community discovery using distributed robust nonnegative matrix factorization with SimRank similarity measure He, Chaobo
2018
74 10 p. 5601-5624
artikel
21 Infrequent pattern mining in smart healthcare environment using data summarization Ahmed, Mohiuddin
2018
74 10 p. 5041-5059
artikel
22 Modeling SmallClient indexing framework for big data analytics Siddiqa, Aisha
2017
74 10 p. 5241-5262
artikel
23 Multi-queue scheduling of heterogeneous jobs in hybrid geo-distributed cloud environment Chunlin, Li
2018
74 10 p. 5263-5292
artikel
24 Multi-tenant intrusion detection system for public cloud (MTIDS) Hawedi, Mohamed
2018
74 10 p. 5199-5230
artikel
25 NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks Mehmood, Amjad
2018
74 10 p. 5156-5170
artikel
26 Next-generation cybersecurity through a blockchain-enabled federated cloud framework Malomo, Olumide O.
2018
74 10 p. 5099-5126
artikel
27 Optimizing inter-nest data locality in imperfect stencils based on loop blocking Seyfari, Yousef
2018
74 10 p. 5432-5460
artikel
28 PL-DVFS: combining Power-aware List-based scheduling algorithm with DVFS technique for real-time tasks in Cloud Computing Safari, Monireh
2018
74 10 p. 5578-5600
artikel
29 Prediction of air travel demand using a hybrid artificial neural network (ANN) with Bat and Firefly algorithms: a case study Mostafaeipour, Ali
2018
74 10 p. 5461-5484
artikel
30 Real-time identification of three Tor pluggable transports using machine learning techniques Soleimani, Mohammad Hassan Mojtahed
2018
74 10 p. 4910-4927
artikel
31 SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks Ubaid, Saqib
2018
74 10 p. 5022-5040
artikel
32 Security threats to critical infrastructure: the human factor Ghafir, Ibrahim
2018
74 10 p. 4986-5002
artikel
33 Threats to critical infrastructure from AI and human intelligence Chaudhry, Junaid
2018
74 10 p. 4865-4866
artikel
34 Towards ontology-based multilingual URL filtering: a big data problem Hussain, Mubashar
2018
74 10 p. 5003-5021
artikel
35 Virtual sensor as a service: a new multicriteria QoS-aware cloud service composition for IoT applications Khansari, Mina Emami
2018
74 10 p. 5485-5512
artikel
                             35 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland