Found: 82
Select item for more details and to access through your institution.
A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security.
- Published in:
- Telecommunication Systems, 2024, v. 87, n. 3, p. 605, doi. 10.1007/s11235-024-01200-y
- By:
- Publication type:
- Article
Does Short-and-Distort Scheme Really Exist? A Bitcoin Futures Audit Scheme through BIRCH & BPNN Approach.
- Published in:
- Computational Economics, 2024, v. 63, n. 4, p. 1649, doi. 10.1007/s10614-023-10378-3
- By:
- Publication type:
- Article
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
- Published in:
- Telecommunication Systems, 2023, v. 84, n. 4, p. 549, doi. 10.1007/s11235-023-01059-5
- By:
- Publication type:
- Article
A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance.
- Published in:
- Telecommunication Systems, 2022, v. 81, n. 2, p. 207, doi. 10.1007/s11235-022-00943-w
- By:
- Publication type:
- Article
A novel secure DV-Hop localization algorithm against wormhole attacks.
- Published in:
- Telecommunication Systems, 2022, v. 80, n. 3, p. 413, doi. 10.1007/s11235-022-00914-1
- By:
- Publication type:
- Article
Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments.
- Published in:
- Telecommunication Systems, 2015, v. 60, n. 2, p. 303, doi. 10.1007/s11235-015-0031-8
- By:
- Publication type:
- Article
Foreword.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 1, p. 1, doi. 10.1007/s11235-013-9719-9
- By:
- Publication type:
- Article
A scalable P2P overlay based on arrangement graph with minimized overhead.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 497, doi. 10.1007/s12083-013-0229-z
- By:
- Publication type:
- Article
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 20, p. 5735, doi. 10.3390/s20205735
- By:
- Publication type:
- Article
Recognition of Crop Diseases Based on Depthwise Separable Convolution in Edge Computing.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 15, p. 4091, doi. 10.3390/s20154091
- By:
- Publication type:
- Article
SNPL: One Scheme of Securing Nodes in IoT Perception Layer.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 4, p. 1090, doi. 10.3390/s20041090
- By:
- Publication type:
- Article
Distributed Reliable and Efficient Transmission Task Assignment for WSNs.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 22, p. 5028, doi. 10.3390/s19225028
- By:
- Publication type:
- Article
Iterative Positioning Algorithm for Indoor Node Based on Distance Correction in WSNs.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 22, p. 4871, doi. 10.3390/s19224871
- By:
- Publication type:
- Article
A Resource Allocation Mechanism Based on Weighted Efficiency Interference-Aware for D2D Underlaid Communication.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 14, p. 3194, doi. 10.3390/s19143194
- By:
- Publication type:
- Article
Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment†.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 3, p. 487, doi. 10.3390/s19030487
- By:
- Publication type:
- Article
Foreword from Guest Editors.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
Improvements on dynamic adjustment mechanism in co-allocation data grid environments.
- Published in:
- Journal of Supercomputing, 2007, v. 40, n. 3, p. 269, doi. 10.1007/s11227-006-0022-3
- By:
- Publication type:
- Article
The design and implementation of Visuel performance monitoring and analysis toolkit for cluster and grid environments.
- Published in:
- Journal of Supercomputing, 2007, v. 40, n. 3, p. 299, doi. 10.1007/s11227-006-0020-5
- By:
- Publication type:
- Article
An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster Environments.
- Published in:
- Journal of Supercomputing, 2005, v. 34, n. 3, p. 315, doi. 10.1007/s11227-005-0787-9
- By:
- Publication type:
- Article
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 9, p. 4423, doi. 10.1007/s00500-021-06496-5
- By:
- Publication type:
- Article
A two-stage intrusion detection approach for software-defined IoT networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 16, p. 10935, doi. 10.1007/s00500-021-05809-y
- By:
- Publication type:
- Article
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 13, p. 8223, doi. 10.1007/s00500-021-05749-7
- By:
- Publication type:
- Article
Cross-modality co-attention networks for visual question answering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 7, p. 5411, doi. 10.1007/s00500-020-05539-7
- By:
- Publication type:
- Article
Sentiment classification model for Chinese micro-blog comments based on key sentences extraction.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 1, p. 463, doi. 10.1007/s00500-020-05160-8
- By:
- Publication type:
- Article
Wireless sensor network intrusion detection system based on MK-ELM.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 16, p. 12361, doi. 10.1007/s00500-020-04678-1
- By:
- Publication type:
- Article
On one-time cookies protocol based on one-time password.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 8, p. 5657, doi. 10.1007/s00500-019-04138-5
- By:
- Publication type:
- Article
Improving file locality in multi-keyword top-k search based on clustering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 9, p. 3111, doi. 10.1007/s00500-018-3145-6
- By:
- Publication type:
- Article
Exploiting dynamic transaction queue size in scalable memory systems.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 6, p. 2065, doi. 10.1007/s00500-016-2470-x
- By:
- Publication type:
- Article
Fine-grained searchable encryption in multi-user setting.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 20, p. 6201, doi. 10.1007/s00500-016-2179-x
- By:
- Publication type:
- Article
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 16, p. 4829, doi. 10.1007/s00500-017-2684-6
- By:
- Publication type:
- Article
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 14, p. 3907, doi. 10.1007/s00500-016-2040-2
- By:
- Publication type:
- Article
Isaacs' syndrome as the initial presentation of malignant thymoma and associated with double-positive voltage-gated potassium channel complex antibodies, a case report.
- Published in:
- 2022
- By:
- Publication type:
- Case Study
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
- Published in:
- Computational & Mathematical Methods in Medicine, 2020, p. 1, doi. 10.1155/2020/3658795
- By:
- Publication type:
- Article
K maximum probability attack paths generation algorithm for target nodes in networked systems.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 4, p. 535, doi. 10.1007/s10207-020-00517-4
- By:
- Publication type:
- Article
On the Exploitation of Blockchain for Distributed File Storage.
- Published in:
- Journal of Sensors, 2020, p. 1, doi. 10.1155/2020/8861688
- By:
- Publication type:
- Article
On the Exploitation of Blockchain for Distributed File Storage.
- Published in:
- Journal of Sensors, 2020, p. 1, doi. 10.1155/2020/8861688
- By:
- Publication type:
- Article
Boundary enhancement and refinement network for camouflaged object detection.
- Published in:
- Machine Vision & Applications, 2024, v. 35, n. 5, p. 1, doi. 10.1007/s00138-024-01588-2
- By:
- Publication type:
- Article
Verifiable data streaming with efficient update for intelligent automation systems.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 2, p. 1322, doi. 10.1002/int.22671
- By:
- Publication type:
- Article
A novel oversampling and feature selection hybrid algorithm for imbalanced data classification.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 3, p. 3231, doi. 10.1007/s11042-022-13240-0
- By:
- Publication type:
- Article
A novel approach for mobile malware classification and detection in Android systems.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3529, doi. 10.1007/s11042-018-6498-z
- By:
- Publication type:
- Article
A Security Situation Prediction Algorithm Based on HMM in Mobile Network.
- Published in:
- Wireless Communications & Mobile Computing, 2018, p. 1, doi. 10.1155/2018/5380481
- By:
- Publication type:
- Article
Non-uniform de-Scattering and de-Blurring of Underwater Images.
- Published in:
- Mobile Networks & Applications, 2018, v. 23, n. 2, p. 352, doi. 10.1007/s11036-017-0933-7
- By:
- Publication type:
- Article
Building a mobile movie recommendation service by user rating and APP usage with linked data on Hadoop.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 3, p. 3383, doi. 10.1007/s11042-016-3833-0
- By:
- Publication type:
- Article
EDFIDepth: enriched multi-path vision transformer feature interaction networks for monocular depth estimation.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21023, doi. 10.1007/s11227-024-06205-7
- By:
- Publication type:
- Article
MWformer: a novel low computational cost image restoration algorithm.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21508, doi. 10.1007/s11227-024-06160-3
- By:
- Publication type:
- Article
Retraction Note: Detecting straggler MapReduce tasks in big data processing infrastructure by neural network.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10444, doi. 10.1007/s11227-023-05833-9
- By:
- Publication type:
- Article
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2487, doi. 10.1007/s11227-023-05561-0
- By:
- Publication type:
- Article
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 202, doi. 10.1007/s11227-023-05438-2
- By:
- Publication type:
- Article