Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks Sivanesh, S.

26 4 p. 1696-1704
artikel
2 A Confidence-Guided Evaluation for Log Parsers Inner Quality Xie, Xueshuo

26 4 p. 1638-1649
artikel
3 A Fault Tolerant Mechanism for UE Authentication in 5G Networks Leu, Fang-Yie

26 4 p. 1650-1667
artikel
4 A Graded Reversible Watermarking Scheme for Relational Data Hou, Ruitao

26 4 p. 1552-1563
artikel
5 An Efficient Bounded Model Checking Approach for Web Service Composition Li, Yuanzhang

26 4 p. 1503-1513
artikel
6 An Efficient Scheme of Cloud Data Assured Deletion Tian, Yuechi

26 4 p. 1597-1608
artikel
7 An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers Zhou, Yutian

26 4 p. 1616-1629
artikel
8 A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks Yang, Hongyu

26 4 p. 1564-1573
artikel
9 A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data Fu, Shaojing

26 4 p. 1574-1585
artikel
10 A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things Jia, Bing

26 4 p. 1523-1531
artikel
11 A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network Usman, Qamar

26 4 p. 1801-1820
artikel
12 A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications Yue, Xiaohan

26 4 p. 1412-1429
artikel
13 A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis Zhang, Quanxin

26 4 p. 1493-1502
artikel
14 ClusTi: Clustering Method for Table Structure Recognition in Scanned Images Zucker, Arthur

26 4 p. 1765-1776
artikel
15 Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments Coyac-Torres, Jorge E.

26 4 p. 1449-1460
artikel
16 Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow Duong, Trung Q.

26 4 p. 1747-1749
artikel
17 Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT Li, Jing

26 4 p. 1551
artikel
18 Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment Jing, Zhengjun

26 4 p. 1609-1615
artikel
19 Editorial: Security and Privacy in Computing and Communications Liu, Zheli

26 4 p. 1407-1411
artikel
20 Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing Ranjbar, M.

26 4 p. 1750-1764
artikel
21 Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels Nguyen, Ba Cao

26 4 p. 1777-1787
artikel
22 Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT Li, Jing

26 4 p. 1543-1550
artikel
23 Intrusion Detection System for IoT Heterogeneous Perceptual Network Zhou, Man

26 4 p. 1461-1474
artikel
24 Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor Zhang, Jian

26 4 p. 1668-1685
artikel
25 Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change Linh, Vu Thuy

26 4 p. 1788-1800
artikel
26 MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN Tang, Dan

26 4 p. 1705-1722
artikel
27 Network Risk Assessment Based on Baum Welch Algorithm and HMM Wang, Chundong

26 4 p. 1630-1637
artikel
28 PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model Ding, Yong

26 4 p. 1514-1522
artikel
29 Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet Wang, Na

26 4 p. 1430-1439
artikel
30 Quadratic Poly Certificateless Inductive Signcryption for Network Security Sumithra, A.

26 4 p. 1586-1596
artikel
31 Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis Lu, Hui

26 4 p. 1723-1732
artikel
32 Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem Xu, Jian

26 4 p. 1475-1492
artikel
33 Secure Encrypted Data Deduplication Based on Data Popularity He, Yunlong

26 4 p. 1686-1695
artikel
34 Security Assessment for Interdependent Heterogeneous Cyber Physical Systems Peng, Hao

26 4 p. 1532-1542
artikel
35 ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM Guo, Xiaojie

26 4 p. 1733-1746
artikel
36 Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks Wei, Xianglin

26 4 p. 1440-1448
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland