Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             37 results found
no title author magazine year volume issue page(s) type
1 AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis Mehtab, Anam

25 1 p. 180-192
article
2 A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises Andreolini, Mauro

25 1 p. 236-247
article
3 A Market in Dream: the Rapid Development of Anonymous Cybercrime Zhou, Gengqian

25 1 p. 259-270
article
4 An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices Ribeiro, José

25 1 p. 164-172
article
5 An Auxiliary Antenna Based Inter-User Interference Mitigation Approach in Full-Duplex Wireless Networks Wu, Fei

25 1 p. 16-22
article
6 Anomaly Detection in UASN Localization Based on Time Series Analysis and Fuzzy Logic Das, Anjana P.

25 1 p. 55-67
article
7 A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration Feng, Bin

25 1 p. 82-94
article
8 A Physical-Layer Key Distribution Mechanism for IoT Networks Alhasanat, Mohanad

25 1 p. 173-178
article
9 A Physical-Layer Key Distribution Mechanism for IoT Networks Alhasanat, Mohanad

25 1 p. 173-178
article
10 Applying Improved Convolutional Neural Network in Image Classification Hu, Zhen-tao

25 1 p. 133-141
article
11 Confusing-Keyword Based Secure Search over Encrypted Cloud Data Fu, Zhangjie

25 1 p. 125-132
article
12 Consortium Blockchain-Based Secure Software Defined Vehicular Network Zhao, Ning

25 1 p. 314-327
article
13 Coordinated Handover Signaling and Cross-Layer Adaptation in Heterogeneous Wireless Networking Al Emam, Fatma A.

25 1 p. 285-299
article
14 Correction to: A Physical-Layer Key Distribution Mechanism for IoT Networks Alhasanat, Mohanad

25 1 p. 179
article
15 Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm Kantour, Nedjmeddine

25 1 p. 211-222
article
16 Disk Cluster Allocation Behavior in Windows and NTFS Karresand, Martin

25 1 p. 248-258
article
17 Editorial: Advanced Techniques for Memory Forensics Analysis Lanzi, Andrea

25 1 p. 234-235
article
18 Editorial: Physical Layer Security and Wireless Access Control (QSHINE 2017) Wang, Lei

25 1 p. 1-3
article
19 Editorial: Reliable Communication for Emerging Wireless Networks Duong, Trung Q.

25 1 p. 271-273
article
20 Editorial: Security and Privacy Protection for Mobile Applications and Platforms Sucasas, Victor

25 1 p. 151-152
article
21 Enhancing Efficient Link Performance in ZigBee Under Cross-Technology Interference Qin, Zhenquan

25 1 p. 68-81
article
22 Full-Duplex Enabled Time-Efficient Device Discovery for Public Safety Communications Kaleem, Zeeshan

25 1 p. 341-349
article
23 IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks Ramadan, Mohammed

25 1 p. 223-233
article
24 Joint Optimization of Latency Monitoring and Traffic Scheduling in Software Defined Heterogeneous Networks Zhang, Xu

25 1 p. 102-113
article
25 Joint User Association and Power Allocation for Millimeter-Wave Ultra-Dense Networks Nguyen, H. T.

25 1 p. 274-284
article
26 Outage Performance Analysis of Energy Harvesting Wireless Sensor Networks for NOMA Transmissions Vo, Van Nhan

25 1 p. 23-41
article
27 PBDT: an Energy-Efficient Posture based Data Transmission for Repeated Activities in BAN Maitra, Tanmoy

25 1 p. 328-340
article
28 Performance Analysis of Full-Duplex Vehicle-to-Vehicle Relay System over Double-Rayleigh Fading Channels Nguyen, Ba Cao

25 1 p. 363-372
article
29 Performance Specifications for the Roll-Off Factor and Filter Order for Filtered Multitone Modulation in the Maritime VHF Data Exchange System Hu, Qing

25 1 p. 142-150
article
30 Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers Al-Mistarihi, Mamoun F.

25 1 p. 42-54
article
31 Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud Rasool, Saqib

25 1 p. 153-163
article
32 Secrecy Performance in the Internet of Things: Optimal Energy Harvesting Time Under Constraints of Sensors and Eavesdroppers Vo, Van Nhan

25 1 p. 193-210
article
33 Security and Privacy Issues of UAV: A Survey Zhi, Yueyan

25 1 p. 95-101
article
34 Security Performance Analysis of Underlay Cognitive Networks with Helpful Jammer Under Interference from Primary Transmitter Ho-Van, Khuong

25 1 p. 4-15
article
35 Topology Optimizing in FSO-based UAVs Relay Networks for Resilience Enhancement Gu, Zhiqun

25 1 p. 350-362
article
36 Uplink Resource Allocation for Multi-Cluster Internet-of-Things Deployment Underlaying Cellular Networks ElHalawany, Basem M.

25 1 p. 300-313
article
37 WECAN: an Efficient West-East Control Associated Network for Large-Scale SDN Systems Yu, Haisheng

25 1 p. 114-124
article
                             37 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands