Found: 252
Select item for more details and to access through your institution.
Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities.
- Published in:
- Mathematical Biosciences & Engineering, 2024, v. 21, n. 8, p. 1, doi. 10.3934/mbe.2024307
- By:
- Publication type:
- Article
Affective social big data generation algorithm for autonomous controls by CRNN-based end-to-end controls.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 19, p. 27175, doi. 10.1007/s11042-019-7703-4
- By:
- Publication type:
- Article
Spatial parameters for audio coding: MDCT domain analysis and synthesis.
- Published in:
- Multimedia Tools & Applications, 2010, v. 48, n. 2, p. 225, doi. 10.1007/s11042-009-0326-4
- By:
- Publication type:
- Article
Distributed denial of service attacks and its defenses in IoT: a survey.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 7, p. 5320, doi. 10.1007/s11227-019-02945-z
- By:
- Publication type:
- Article
A blockchain-based decentralized efficient investigation framework for IoT digital forensics.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4372, doi. 10.1007/s11227-019-02779-9
- By:
- Publication type:
- Article
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4543, doi. 10.1007/s11227-016-1850-4
- By:
- Publication type:
- Article
CF-CloudOrch: container fog node-based cloud orchestration for IoT networks.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 7024, doi. 10.1007/s11227-018-2493-4
- By:
- Publication type:
- Article
An improved ant colony optimization-based approach with mobile sink for wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 12, p. 6633, doi. 10.1007/s11227-017-2115-6
- By:
- Publication type:
- Article
A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 7, p. 2867, doi. 10.1007/s11227-016-1650-x
- By:
- Publication type:
- Article
Data center selection based on neuro-fuzzy inference systems in cloud computing environments.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 3, p. 1194, doi. 10.1007/s11227-011-0667-4
- By:
- Publication type:
- Article
Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network.
- Published in:
- Journal of Supercomputing, 2011, v. 55, n. 2, p. 155, doi. 10.1007/s11227-010-0411-5
- By:
- Publication type:
- Article
Short-term of Reverse Total Shoulder Arthroplasty for the Treatment of Irreparable Massive Rotator Cuff Tear.
- Published in:
- Clinics in Shoulder & Elbow, 2014, v. 17, n. 4, p. 152, doi. 10.5397/cise.2014.17.4.152
- By:
- Publication type:
- Article
Symmetry-Adapted Machine Learning for Information Security.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Smart Contract-Based Pool Hopping Attack Prevention for Blockchain Networks.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 7, p. 941, doi. 10.3390/sym11070941
- By:
- Publication type:
- Article
Advances in Future Internet and the Industrial Internet of Things.
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 8, p. 164, doi. 10.3390/sym9080164
- By:
- Publication type:
- Article
DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 1, p. 8, doi. 10.3390/sym9010008
- By:
- Publication type:
- Article
Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 1, p. 1, doi. 10.3390/sym9010001
- By:
- Publication type:
- Article
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 11, p. 129, doi. 10.3390/sym8110129
- By:
- Publication type:
- Article
Scenario-Based Digital Forensics Challenges in Cloud Computing.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 107, doi. 10.3390/sym8100107
- By:
- Publication type:
- Article
Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 106, doi. 10.3390/sym8100106
- By:
- Publication type:
- Article
Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 5, p. 37, doi. 10.3390/sym8050037
- By:
- Publication type:
- Article
Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 3, p. 1567, doi. 10.3390/sym7031567
- By:
- Publication type:
- Article
Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 935, doi. 10.3390/sym7020935
- By:
- Publication type:
- Article
Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 546, doi. 10.3390/sym7020546
- By:
- Publication type:
- Article
The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 383, doi. 10.3390/sym7020383
- By:
- Publication type:
- Article
Live Mobile Distance Learning System for Smart Devices.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 2, p. 294, doi. 10.3390/sym7020294
- By:
- Publication type:
- Article
Output Effect Evaluation Based on Input Features in Neural Incremental Attribute Learning for Better Classification Performance.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 53, doi. 10.3390/sym7010053
- By:
- Publication type:
- Article
MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.
- Published in:
- Symmetry (20738994), 2014, v. 6, n. 4, p. 997, doi. 10.3390/sym6040997
- By:
- Publication type:
- Article
Blockchain-Based Cyber Threat Intelligence System Architecture for Sustainable Computing.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 16, p. 6401, doi. 10.3390/su12166401
- By:
- Publication type:
- Article
Machine Learning-Based Network Sub-Slicing Framework in a Sustainable 5G Environment.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 15, p. 6250, doi. 10.3390/su12156250
- By:
- Publication type:
- Article
Decrepit Building Monitoring Solution for Zero Energy Building Management Using PLC and Android Application.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 5, p. 1993, doi. 10.3390/su12051993
- By:
- Publication type:
- Article
BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network.
- Published in:
- Sustainability (2071-1050), 2019, v. 11, n. 14, p. 3974, doi. 10.3390/su11143974
- By:
- Publication type:
- Article
Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City.
- Published in:
- Sustainability (2071-1050), 2019, v. 11, n. 14, p. 3889, doi. 10.3390/su11143889
- By:
- Publication type:
- Article
Advanced IT-Based Future Sustainable Computing (2017–2018).
- Published in:
- Sustainability (2071-1050), 2019, v. 11, n. 8, p. 2264, doi. 10.3390/su11082264
- By:
- Publication type:
- Article
An Energy-Efficient Virtualization-Based Secure Platform for Protecting Sensitive User Data.
- Published in:
- Sustainability (2071-1050), 2017, v. 9, n. 7, p. 1250, doi. 10.3390/su9071250
- By:
- Publication type:
- Article
Advanced IT-Based Future Sustainable Computing.
- Published in:
- Sustainability (2071-1050), 2017, v. 9, n. 5, p. 757, doi. 10.3390/su9050757
- By:
- Publication type:
- Article
EH-GC: An Efficient and Secure Architecture of Energy Harvesting Green Cloud Infrastructure.
- Published in:
- Sustainability (2071-1050), 2017, v. 9, n. 4, p. 673, doi. 10.3390/su9040673
- By:
- Publication type:
- Article
SH-SecNet: An Enhanced Secure Network Architecture for the Diagnosis of Security Threats in a Smart Home.
- Published in:
- Sustainability (2071-1050), 2017, v. 9, n. 4, p. 513, doi. 10.3390/su9040513
- By:
- Publication type:
- Article
FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing.
- Published in:
- Sustainability (2071-1050), 2016, v. 8, n. 9, p. 919, doi. 10.3390/su8090919
- By:
- Publication type:
- Article
Sustainable Load-Balancing Scheme for Inter-Sensor Convergence Processing of Routing Cooperation Topology.
- Published in:
- Sustainability (2071-1050), 2016, v. 8, n. 5, p. 436, doi. 10.3390/su8050436
- By:
- Publication type:
- Article
Efficient Sustainable Operation Mechanism of Distributed Desktop Integration Storage Based on Virtualization with Ubiquitous Computing.
- Published in:
- Sustainability (2071-1050), 2015, v. 7, n. 6, p. 7568, doi. 10.3390/su7067568
- By:
- Publication type:
- Article
An Optimal Path Computation Architecture for the Cloud-Network on Software-Defined Networking.
- Published in:
- Sustainability (2071-1050), 2015, v. 7, n. 5, p. 5413, doi. 10.3390/su7055413
- By:
- Publication type:
- Article
VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing.
- Published in:
- Sustainability (2071-1050), 2015, v. 7, n. 2, p. 2028, doi. 10.3390/su7022028
- By:
- Publication type:
- Article
G-Cloud Monitor: A Cloud Monitoring System for Factory Automation for Sustainable Green Computing.
- Published in:
- Sustainability (2071-1050), 2014, v. 6, n. 12, p. 8510, doi. 10.3390/su6128510
- By:
- Publication type:
- Article
Efficiency Sustainability Resource Visual Simulator for Clustered Desktop Virtualization Based on Cloud Infrastructure.
- Published in:
- Sustainability (2071-1050), 2014, v. 6, n. 11, p. 8079, doi. 10.3390/su6118079
- By:
- Publication type:
- Article
An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/198580
- By:
- Publication type:
- Article
REST-MapReduce: An Integrated Interface but Differentiated Service.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/170723
- By:
- Publication type:
- Article
Angiographic and Clinical Factors Related with Good Functional Outcome after Mechanical Thrombectomy in Acute Cerebral Artery Occlusion.
- Published in:
- Journal of Korean Neurosurgical Society, 2015, v. 58, n. 3, p. 192, doi. 10.3340/jkns.2015.58.3.192
- By:
- Publication type:
- Article
Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’.
- Published in:
- International Journal of Communication Systems, 2008, v. 21, n. 5, p. 569, doi. 10.1002/dac.940
- By:
- Publication type:
- Article