no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A multi-step attack-correlation method with privacy protection
|
Zhang, Yongtang |
|
2016 |
1 |
4 |
p. 133-142 |
article |
2 |
Analysis of SVEIR worm attack model with saturated incidence and partial immunization
|
Wang, Fangwei |
|
2016 |
1 |
4 |
p. 105-115 |
article |
3 |
A survey of privacy protection techniques for mobile devices
|
Zhang, Lei |
|
2016 |
1 |
4 |
p. 86-92 |
article |
4 |
A survey of routing techniques for satellite networks
|
Qi, Xiaogang |
|
2016 |
1 |
4 |
p. 66-85 |
article |
5 |
Game strategies for distributed denial of service defense in the Cloud of Things
|
Wang, Yichuan |
|
2016 |
1 |
4 |
p. 143-155 |
article |
6 |
On the architecture and development life cycle of secure cyber-physical systems
|
Sun, Cong |
|
2016 |
1 |
4 |
p. 1-21 |
article |
7 |
Position based key exchange: defnitions and implementations
|
Zhang, Junwei |
|
2016 |
1 |
4 |
p. 33-43 |
article |
8 |
Secure searchable encryption: a survey
|
Wang, Yunling |
|
2016 |
1 |
4 |
p. 52-65 |
article |
9 |
Securing acoustics-based short-range communication systems: an overview
|
Chen, Si |
|
2016 |
1 |
4 |
p. 44-51 |
article |
10 |
Smart data deduplication for telehealth systems in heterogeneous cloud computing
|
Gai, Keke |
|
2016 |
1 |
4 |
p. 93-104 |
article |
11 |
Towards energy efficient cloud: an optimized ant colony model for virtual machine placement
|
Zhang, Liumei |
|
2016 |
1 |
4 |
p. 116-132 |
article |
12 |
Towards privacy-preserving user targeting
|
Jiang, Jinghua |
|
2016 |
1 |
4 |
p. 22-32 |
article |