Linked e-resources

Details

Offloading of Fog Data Networks with Network Coded Cooperative D2D Communications
Persistent vs Service IDs in Android: Session Fingerprinting from Apps
Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques
Performance Comparison of Distributed Pattern Matching Algorithms on Hadoop MapReduce Framework
Robust Fingerprint Matching Based on Convolutional Neural Networks
A Personalized Multi-Keyword Ranked Search Method over Encrypted Cloud Data
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling
Factor Effects for Routing in a Delay-tolerant Wireless Sensor Network for Lake Environment Monitoring
Estimating public opinion in social media content using aspect-based opinion mining
A Robust Contactless Fingerprint Enhancement Algorithm
Designing Anomaly Detection System for Cloud Servers by Frequency Domain Features of System Call Identifiers and Machine Learning
A Variant of BLS Signature Scheme With Tight Security Reduction
Quantum authentication scheme based on fingerprintencoded graph states
Cooperative Information Security/ Cybersecurity Curriculum Development
An Energy Saving Mechanism based on Vacation Queuing Theory in Data Center Networks
Homomorphic Evaluation of Database Queries
A Cache-aware Congestion Control for Reliable Transport in Wireless Sensor Networks
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources
Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs
Performance Assessment of Cloud Migrations from Network and Application Point of View
A Cloud Service Enhanced Method Supporting Context-aware Applications
Application of 3D Delaunay Triangulation in Fingerprint Authentication System
A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources
Fog Computing as a Critical Link between a Central Cloud and IoT in Support of Fast Discovery of New Hydrocarbon Reservoirs
Performance Assessment of Cloud Migrations from Network and Application Point of View
A Cloud Service Enhanced Method Supporting Context-aware Applications
Application of 3D Delaunay Triangulation in Fingerprint Authentication System
The Public Verifiability of Public Key Encryption with Keyword Search
Malicious Bitcoin Transaction Tracing Using Incidence
Relation Clustering
Cryptanalysis of Salsa and ChaCha: Revisited
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains
Probability Risk Identification Based Intrusion Detection System for SCADA Systems
Anonymizing k-NN Classification on MapReduce
A Cancellable Ranking based Hashing Method for Fingerprint Template Protection.

Browse Subjects

Show more subjects...

Statistics

from
to
Export