Found: 31
Select item for more details and to access through your institution.
Multi-Domain Authentication Protocol Based on Dual-Signature.
- Published in:
- Telkomnika, 2015, v. 13, n. 1, p. 290, doi. 10.12928/TELKOMNIKA.v13i1.1164
- By:
- Publication type:
- Article
An Unhealthy Webpage Discovery System Based on Convolutional Neural Network.
- Published in:
- International Journal of Digital Crime & Forensics, 2022, v. 14, n. 3, p. 1, doi. 10.4018/IJDCF.315614
- By:
- Publication type:
- Article
Network Traffic Prediction in an Edge–Cloud Continuum Network for Multiple Network Service Providers.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 17, p. 3515, doi. 10.3390/electronics13173515
- By:
- Publication type:
- Article
FQTrack:Object Tracking Method Based on a Feature-Enhanced Memory Network and Memory Quality Selection Mechanism.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3221, doi. 10.3390/electronics13163221
- By:
- Publication type:
- Article
One-Dimensional Convolutional Wasserstein Generative Adversarial Network Based Intrusion Detection Method for Industrial Control Systems.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 22, p. 4653, doi. 10.3390/electronics12224653
- By:
- Publication type:
- Article
Federated Learning Based on Mutual Information Clustering for Wireless Traffic Prediction.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 21, p. 4476, doi. 10.3390/electronics12214476
- By:
- Publication type:
- Article
VNF Migration in Digital Twin Network for NFV Environment.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 20, p. 4324, doi. 10.3390/electronics12204324
- By:
- Publication type:
- Article
Differential Privacy-Based Spatial-Temporal Trajectory Clustering Scheme for LBSNs.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 18, p. 3767, doi. 10.3390/electronics12183767
- By:
- Publication type:
- Article
Industrial Internet Intrusion Detection Based on Res-CNN-SRU.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 15, p. 3267, doi. 10.3390/electronics12153267
- By:
- Publication type:
- Article
Network Security Situation Assessment Model Based on SAA-SSA-BPNN.
- Published in:
- Journal of Computer Engineering & Applications, 2022, v. 58, n. 11, p. 117, doi. 10.3778/j.issn.1002-8331.2110-0391
- By:
- Publication type:
- Article
Echo State Network-Based Content Prediction for Mobile Edge Caching Networks.
- Published in:
- International Journal of Information Technology & Web Engineering, 2023, v. 18, n. 1, p. 1, doi. 10.4018/IJITWE.317219
- By:
- Publication type:
- Article
Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment.
- Published in:
- KSII Transactions on Internet & Information Systems, 2023, v. 17, n. 3, p. 896, doi. 10.3837/tiis.2023.03.012
- By:
- Publication type:
- Article
Multi-level Cross-attention Siamese Network For Visual Object Tracking.
- Published in:
- KSII Transactions on Internet & Information Systems, 2022, v. 16, n. 12, p. 3976, doi. 10.3837/tiis.2022.12.011
- By:
- Publication type:
- Article
Prediction of Network Security Situation Based on Attention Mechanism and Convolutional Neural Network–Gated Recurrent Unit.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 15, p. 6652, doi. 10.3390/app14156652
- By:
- Publication type:
- Article
DBSTGNN-Att: Dual Branch Spatio-Temporal Graph Neural Network with an Attention Mechanism for Cellular Network Traffic Prediction.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 5, p. 2173, doi. 10.3390/app14052173
- By:
- Publication type:
- Article
RepVGG-SimAM: An Efficient Bad Image Classification Method Based on RepVGG with Simple Parameter-Free Attention Module.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 21, p. 11925, doi. 10.3390/app132111925
- By:
- Publication type:
- Article
Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA.
- Published in:
- International Journal of Performability Engineering, 2020, v. 16, n. 8, p. 1171, doi. 10.23940/ijpe.20.08.p4.11711182
- By:
- Publication type:
- Article
A BD Group Key Negotiation Protocol based on Clustering Technology.
- Published in:
- International Journal of Performability Engineering, 2020, v. 16, n. 6, p. 875, doi. 10.23940/ijpe.20.06.p6.875882
- By:
- Publication type:
- Article
An Adaptive Traffic-Aware Migration Algorithm Selection Framework in Live Migration of Multiple Virtual Machines.
- Published in:
- International Journal of Performability Engineering, 2020, v. 16, n. 2, p. 314, doi. 10.23940/ijpe.20.02.p14.314324
- By:
- Publication type:
- Article
Design and Implementation of Online Mall System based on Java Web.
- Published in:
- International Journal of Performability Engineering, 2019, v. 15, n. 12, p. 3237, doi. 10.23940/ijpe.19.12.p15.32373244
- By:
- Publication type:
- Article
Content-Centric Network Caching Strategy based on Node Situational Degree.
- Published in:
- International Journal of Performability Engineering, 2019, v. 15, n. 8, p. 2190, doi. 10.23940/ijpe.19.08.p19.21902198
- By:
- Publication type:
- Article
A Strongly Secure and Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 11, p. 2831, doi. 10.23940/ijpe.18.11.p29.28312841
- By:
- Publication type:
- Article
A Hierarchical Caching Decision Algorithm for Content-Centric Network.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 10, p. 2504, doi. 10.23940/ijpe.18.10.p26.25042510
- By:
- Publication type:
- Article
Research and Development of Blockchain Security.
- Published in:
- International Journal of Performability Engineering, 2018, v. 14, n. 9, p. 2040, doi. 10.23940/ijpe.18.09.p12.20402047
- By:
- Publication type:
- Article
A Plan Recognizing Algorithm based on Fuzzy Cognitive Plan Map.
- Published in:
- International Journal of Performability Engineering, 2017, v. 13, n. 7, p. 1094, doi. 10.23940/ijpe.17.07.p12.10941100
- By:
- Publication type:
- Article
An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 2, p. 2693, doi. 10.1007/s11277-017-4320-2
- By:
- Publication type:
- Article
Blockchain-Enabled Privacy-Preserving Location Sharing Scheme for LBSNs.
- Published in:
- Mobile Information Systems, 2021, p. 1, doi. 10.1155/2021/9997887
- By:
- Publication type:
- Article
nanofluid, cellule de Hele-Shaw, thermophorèse, mouvement Brownien, bioconvection, Micro-organisme gyrotactique.
- Published in:
- Instrumentation, Mesures, Métrologies, 2018, v. 17, n. 4, p. 593, doi. 10.3166/I2M.17.593-603
- By:
- Publication type:
- Article
Expert System of Diabetes Diagnosis Based On C#.
- Published in:
- RISTI: Iberian Journal on Information Systems & Technologies / Revista Ibérica de Sistemas e Tecnologias de Informação, 2016, n. E13, p. 372
- By:
- Publication type:
- Article
Research on Chinese Word Segmentation Based on Matrix Restraint.
- Published in:
- RISTI: Iberian Journal on Information Systems & Technologies / Revista Ibérica de Sistemas e Tecnologias de Informação, 2016, n. E9, p. 150
- By:
- Publication type:
- Article
Toward Pattern and Preference-Aware Travel Route Recommendation over Location-Based Social Networks.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 5, p. 959, doi. 10.6688/JISE.201909_35(5).0002
- By:
- Publication type:
- Article