nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks
|
Sivanesh, S. |
|
|
26 |
4 |
p. 1696-1704 |
artikel |
2 |
A Confidence-Guided Evaluation for Log Parsers Inner Quality
|
Xie, Xueshuo |
|
|
26 |
4 |
p. 1638-1649 |
artikel |
3 |
A Fault Tolerant Mechanism for UE Authentication in 5G Networks
|
Leu, Fang-Yie |
|
|
26 |
4 |
p. 1650-1667 |
artikel |
4 |
A Graded Reversible Watermarking Scheme for Relational Data
|
Hou, Ruitao |
|
|
26 |
4 |
p. 1552-1563 |
artikel |
5 |
An Efficient Bounded Model Checking Approach for Web Service Composition
|
Li, Yuanzhang |
|
|
26 |
4 |
p. 1503-1513 |
artikel |
6 |
An Efficient Scheme of Cloud Data Assured Deletion
|
Tian, Yuechi |
|
|
26 |
4 |
p. 1597-1608 |
artikel |
7 |
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers
|
Zhou, Yutian |
|
|
26 |
4 |
p. 1616-1629 |
artikel |
8 |
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks
|
Yang, Hongyu |
|
|
26 |
4 |
p. 1564-1573 |
artikel |
9 |
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data
|
Fu, Shaojing |
|
|
26 |
4 |
p. 1574-1585 |
artikel |
10 |
A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things
|
Jia, Bing |
|
|
26 |
4 |
p. 1523-1531 |
artikel |
11 |
A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network
|
Usman, Qamar |
|
|
26 |
4 |
p. 1801-1820 |
artikel |
12 |
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications
|
Yue, Xiaohan |
|
|
26 |
4 |
p. 1412-1429 |
artikel |
13 |
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis
|
Zhang, Quanxin |
|
|
26 |
4 |
p. 1493-1502 |
artikel |
14 |
ClusTi: Clustering Method for Table Structure Recognition in Scanned Images
|
Zucker, Arthur |
|
|
26 |
4 |
p. 1765-1776 |
artikel |
15 |
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments
|
Coyac-Torres, Jorge E. |
|
|
26 |
4 |
p. 1449-1460 |
artikel |
16 |
Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow
|
Duong, Trung Q. |
|
|
26 |
4 |
p. 1747-1749 |
artikel |
17 |
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
|
Li, Jing |
|
|
26 |
4 |
p. 1551 |
artikel |
18 |
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment
|
Jing, Zhengjun |
|
|
26 |
4 |
p. 1609-1615 |
artikel |
19 |
Editorial: Security and Privacy in Computing and Communications
|
Liu, Zheli |
|
|
26 |
4 |
p. 1407-1411 |
artikel |
20 |
Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing
|
Ranjbar, M. |
|
|
26 |
4 |
p. 1750-1764 |
artikel |
21 |
Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels
|
Nguyen, Ba Cao |
|
|
26 |
4 |
p. 1777-1787 |
artikel |
22 |
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT
|
Li, Jing |
|
|
26 |
4 |
p. 1543-1550 |
artikel |
23 |
Intrusion Detection System for IoT Heterogeneous Perceptual Network
|
Zhou, Man |
|
|
26 |
4 |
p. 1461-1474 |
artikel |
24 |
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor
|
Zhang, Jian |
|
|
26 |
4 |
p. 1668-1685 |
artikel |
25 |
Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change
|
Linh, Vu Thuy |
|
|
26 |
4 |
p. 1788-1800 |
artikel |
26 |
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN
|
Tang, Dan |
|
|
26 |
4 |
p. 1705-1722 |
artikel |
27 |
Network Risk Assessment Based on Baum Welch Algorithm and HMM
|
Wang, Chundong |
|
|
26 |
4 |
p. 1630-1637 |
artikel |
28 |
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model
|
Ding, Yong |
|
|
26 |
4 |
p. 1514-1522 |
artikel |
29 |
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet
|
Wang, Na |
|
|
26 |
4 |
p. 1430-1439 |
artikel |
30 |
Quadratic Poly Certificateless Inductive Signcryption for Network Security
|
Sumithra, A. |
|
|
26 |
4 |
p. 1586-1596 |
artikel |
31 |
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis
|
Lu, Hui |
|
|
26 |
4 |
p. 1723-1732 |
artikel |
32 |
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
|
Xu, Jian |
|
|
26 |
4 |
p. 1475-1492 |
artikel |
33 |
Secure Encrypted Data Deduplication Based on Data Popularity
|
He, Yunlong |
|
|
26 |
4 |
p. 1686-1695 |
artikel |
34 |
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems
|
Peng, Hao |
|
|
26 |
4 |
p. 1532-1542 |
artikel |
35 |
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM
|
Guo, Xiaojie |
|
|
26 |
4 |
p. 1733-1746 |
artikel |
36 |
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks
|
Wei, Xianglin |
|
|
26 |
4 |
p. 1440-1448 |
artikel |