Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis Mehtab, Anam

25 1 p. 180-192
artikel
2 A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises Andreolini, Mauro

25 1 p. 236-247
artikel
3 A Market in Dream: the Rapid Development of Anonymous Cybercrime Zhou, Gengqian

25 1 p. 259-270
artikel
4 An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices Ribeiro, José

25 1 p. 164-172
artikel
5 An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks Wu, Fei

25 1 p. 16-22
artikel
6 Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic Das, Anjana P.

25 1 p. 55-67
artikel
7 A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration Feng, Bin

25 1 p. 82-94
artikel
8 A Physical-Layer Key Distribution Mechanism for IoT Networks Alhasanat, Mohanad

25 1 p. 173-178
artikel
9 A Physical-Layer Key Distribution Mechanism for IoT Networks Alhasanat, Mohanad

25 1 p. 173-178
artikel
10 Applying Improved Convolutional Neural Network in Image Classification Hu, Zhen-tao

25 1 p. 133-141
artikel
11 Confusing-Keyword Based Secure Search over Encrypted Cloud Data Fu, Zhangjie

25 1 p. 125-132
artikel
12 Consortium Blockchain-Based Secure Software Defined Vehicular Network Zhao, Ning

25 1 p. 314-327
artikel
13 Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking Al Emam, Fatma A.

25 1 p. 285-299
artikel
14 Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks Alhasanat, Mohanad

25 1 p. 179
artikel
15 Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm Kantour, Nedjmeddine

25 1 p. 211-222
artikel
16 Disk Cluster Allocation Behavior in Windows and NTFS Karresand, Martin

25 1 p. 248-258
artikel
17 Editorial: Advanced Techniques for Memory Forensics Analysis Lanzi, Andrea

25 1 p. 234-235
artikel
18 Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017) Wang, Lei

25 1 p. 1-3
artikel
19 Editorial: Reliable Communication for Emerging Wireless Networks Duong, Trung Q.

25 1 p. 271-273
artikel
20 Editorial: Security and Privacy Protection for Mobile Applications and Platforms Sucasas, Victor

25 1 p. 151-152
artikel
21 Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference Qin, Zhenquan

25 1 p. 68-81
artikel
22 Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications Kaleem, Zeeshan

25 1 p. 341-349
artikel
23 IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks Ramadan, Mohammed

25 1 p. 223-233
artikel
24 Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks Zhang, Xu

25 1 p. 102-113
artikel
25 Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks Nguyen, H. T.

25 1 p. 274-284
artikel
26 Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions Vo, Van Nhan

25 1 p. 23-41
artikel
27 PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN Maitra, Tanmoy

25 1 p. 328-340
artikel
28 Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels Nguyen, Ba Cao

25 1 p. 363-372
artikel
29 Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System Hu, Qing

25 1 p. 142-150
artikel
30 Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers Al-Mistarihi, Mamoun F.

25 1 p. 42-54
artikel
31 Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud Rasool, Saqib

25 1 p. 153-163
artikel
32 Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers Vo, Van Nhan

25 1 p. 193-210
artikel
33 Security and Privacy Issues of UAV: A Survey Zhi, Yueyan

25 1 p. 95-101
artikel
34 Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter Ho-Van, Khuong

25 1 p. 4-15
artikel
35 Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement Gu, Zhiqun

25 1 p. 350-362
artikel
36 Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks ElHalawany, Basem M.

25 1 p. 300-313
artikel
37 WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems Yu, Haisheng

25 1 p. 114-124
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland
Toegankelijkheidsverklaring