Found: 52
Select item for more details and to access through your institution.
Distributed Denial of Service (DDoS) detection by traffic pattern analysis.
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 346, doi. 10.1007/s12083-012-0173-3
- By:
- Publication type:
- Article
An effective non-parametric method for globally clustering genes from expression profiles.
- Published in:
- Medical & Biological Engineering & Computing, 2007, v. 45, n. 12, p. 1175, doi. 10.1007/s11517-007-0271-1
- By:
- Publication type:
- Article
Special Issue: Securing Distributed Networks and Systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2011, v. 23, n. 12, p. 1311, doi. 10.1002/cpe.1703
- By:
- Publication type:
- Article
A microscopic competition model and its dynamics analysis on network attacks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2010, v. 22, n. 4, p. 503, doi. 10.1002/cpe.1499
- By:
- Publication type:
- Article
I/O scheduling and performance analysis on multi-core platforms.
- Published in:
- Concurrency & Computation: Practice & Experience, 2009, v. 21, n. 10, p. 1405, doi. 10.1002/cpe.1421
- By:
- Publication type:
- Article
Spam filtering for network traffic security on a multi-core environment.
- Published in:
- Concurrency & Computation: Practice & Experience, 2009, v. 21, n. 10, p. 1307, doi. 10.1002/cpe.1435
- By:
- Publication type:
- Article
Special Issue: Multi-core Supported Network and System Security.
- Published in:
- Concurrency & Computation: Practice & Experience, 2009, v. 21, n. 10, p. 1251, doi. 10.1002/cpe.1431
- By:
- Publication type:
- Article
Frequency distribution of TATA Box and extension sequences on human promoters.
- Published in:
- BMC Bioinformatics, 2006, v. 7, p. S2, doi. 10.1186/1471-2105-7-S4-S2
- By:
- Publication type:
- Article
The Development of a Mobile Decision Support System.
- Published in:
- Journal of Interconnection Networks, 2001, v. 2, n. 3, p. 379, doi. 10.1142/S0219265901000452
- By:
- Publication type:
- Article
Special Issue on Social Multimedia Computing: Challenges, Techniques, and Applications.
- Published in:
- Journal of Multimedia, 2014, v. 9, n. 1, p. 1, doi. 10.4304/jmm.9.1.1-3
- By:
- Publication type:
- Article
Advances in Network and System Security: Editorial Statement.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 382
- By:
- Publication type:
- Article
Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics.
- Published in:
- Computer Journal, 2012, v. 55, n. 4, p. 410
- By:
- Publication type:
- Article
Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1661, doi. 10.1093/comjnl/bxr078
- By:
- Publication type:
- Article
The Microcosmic Model of Worm Propagation.
- Published in:
- Computer Journal, 2011, v. 54, n. 10, p. 1700, doi. 10.1093/comjnl/bxr082
- By:
- Publication type:
- Article
DECISION ANALYSIS OF STATISTICALLY DETECTING DISTRIBUTED DENIAL-OF-SERVICE FLOODING ATTACKS.
- Published in:
- International Journal of Information Technology & Decision Making, 2003, v. 2, n. 3, p. 397, doi. 10.1142/S0219622003000720
- By:
- Publication type:
- Article
Evolution of cooperation in malicious social networks with differential privacy mechanisms.
- Published in:
- Neural Computing & Applications, 2023, v. 35, n. 18, p. 12979, doi. 10.1007/s00521-020-05243-5
- By:
- Publication type:
- Article
Image fairness in deep learning: problems, models, and challenges.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 15, p. 12875, doi. 10.1007/s00521-022-07136-1
- By:
- Publication type:
- Article
Secure Tag Search in RFID Systems Using Mobile Readers.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2015, v. 12, n. 2, p. 230, doi. 10.1109/TDSC.2014.2302305
- By:
- Publication type:
- Article
Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
- Published in:
- Entropy, 2016, v. 18, n. 9, p. 334, doi. 10.3390/e18090334
- By:
- Publication type:
- Article
Trust, security and privacy for pervasive applications.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
Using the k-core decomposition to analyze the static structure of large-scale software systems.
- Published in:
- Journal of Supercomputing, 2010, v. 53, n. 2, p. 352, doi. 10.1007/s11227-009-0299-0
- By:
- Publication type:
- Article
A locality aware cache diffusion system.
- Published in:
- Journal of Supercomputing, 2010, v. 52, n. 1, p. 1, doi. 10.1007/s11227-009-0264-y
- By:
- Publication type:
- Article
Sharable file searching in unstructured Peer-to-peer systems.
- Published in:
- Journal of Supercomputing, 2010, v. 51, n. 2, p. 149, doi. 10.1007/s11227-009-0282-9
- By:
- Publication type:
- Article
Delay Control and Parallel Admission Algorithms for Real-Time Anycast Flow.
- Published in:
- Journal of Supercomputing, 2004, v. 29, n. 2, p. 197, doi. 10.1023/B:SUPE.0000026851.92978.ce
- By:
- Publication type:
- Article
Multi‐agent reinforcement learning via knowledge transfer with differentially private noise.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 1, p. 799, doi. 10.1002/int.22648
- By:
- Publication type:
- Article
Non-catalyst synthesis and thermal behaviors of three-arm star aliphatic polycarbonates.
- Published in:
- Journal of Applied Polymer Science, 2015, v. 132, n. 20, p. n/a, doi. 10.1002/app.41998
- By:
- Publication type:
- Article
An iteration-based differentially private social network data release.
- Published in:
- Computer Systems Science & Engineering, 2018, v. 33, n. 2, p. 61, doi. 10.32604/csse.2018.33.061
- By:
- Publication type:
- Article
Adjacency cache: an efficient P2P web cache indexing and lookup system.
- Published in:
- Computer Systems Science & Engineering, 2009, v. 24, n. 5, p. 373
- By:
- Publication type:
- Article
A parallel information retrieval method for e-commerce.
- Published in:
- Computer Systems Science & Engineering, 2009, v. 24, n. 5, p. 331
- By:
- Publication type:
- Article
Network Attacks and Defense Systems.
- Published in:
- Computer Systems Science & Engineering, 2008, v. 23, n. 3, p. 137
- By:
- Publication type:
- Article
Graph neural networks: a survey on the links between privacy and security.
- Published in:
- Artificial Intelligence Review, 2024, v. 57, n. 2, p. 1, doi. 10.1007/s10462-023-10656-4
- By:
- Publication type:
- Article
New challenges in reinforcement learning: a survey of security and privacy.
- Published in:
- Artificial Intelligence Review, 2023, v. 56, n. 7, p. 7195, doi. 10.1007/s10462-022-10348-5
- By:
- Publication type:
- Article
Visual privacy attacks and defenses in deep learning: a survey.
- Published in:
- Artificial Intelligence Review, 2022, v. 55, n. 6, p. 4347, doi. 10.1007/s10462-021-10123-y
- By:
- Publication type:
- Article
Fairness in graph-based semi-supervised learning.
- Published in:
- Knowledge & Information Systems, 2023, v. 65, n. 2, p. 543, doi. 10.1007/s10115-022-01738-w
- By:
- Publication type:
- Article
Privacy-preserving topic model for tagging recommender systems.
- Published in:
- Knowledge & Information Systems, 2016, v. 46, n. 1, p. 33, doi. 10.1007/s10115-015-0832-9
- By:
- Publication type:
- Article
Managing Replicated Remote Procedure Call Transactions.
- Published in:
- Computer Journal, 1999, v. 42, n. 7, p. 592, doi. 10.1093/comjnl/42.7.592
- By:
- Publication type:
- Article
Correlated data in differential privacy: Definition and analysis.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 16, p. 1, doi. 10.1002/cpe.6015
- By:
- Publication type:
- Article
From distributed machine learning to federated learning: In the view of data privacy and security.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 16, p. 1, doi. 10.1002/cpe.6002
- By:
- Publication type:
- Article
Private‐encoder: Enforcing privacy in latent space for human face images.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 3, p. 1, doi. 10.1002/cpe.6548
- By:
- Publication type:
- Article
Static malware clustering using enhanced deep embedding method.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 19, p. N.PAG, doi. 10.1002/cpe.5234
- By:
- Publication type:
- Article
Adversaries or allies? Privacy and deep learning in big data era.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 19, p. N.PAG, doi. 10.1002/cpe.5102
- By:
- Publication type:
- Article
The structure of communities in scale-free networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 14, p. n/a, doi. 10.1002/cpe.4040
- By:
- Publication type:
- Article
A survey of recommendation techniques based on offline data processing.
- Published in:
- Concurrency & Computation: Practice & Experience, 2015, v. 27, n. 15, p. 3915, doi. 10.1002/cpe.3370
- By:
- Publication type:
- Article
CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 10, p. 1137, doi. 10.1002/cpe.1747
- By:
- Publication type:
- Article
Advances in network and system security.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 10, p. 1035, doi. 10.1002/cpe.2810
- By:
- Publication type:
- Article
Distributed Learning in Intelligent Transportation Systems: A Survey.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 9, p. 550, doi. 10.3390/info15090550
- By:
- Publication type:
- Article
Breast cancer prognosis risk estimation using integrated gene expression and clinical data.
- Published in:
- 2014
- By:
- Publication type:
- Journal Article
Breast Cancer Prognosis Risk Estimation Using Integrated Gene Expression and Clinical Data.
- Published in:
- BioMed Research International, 2014, v. 2014, p. 1, doi. 10.1155/2014/459203
- By:
- Publication type:
- Article
Detecting stepping stones by abnormal causality probability.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 10, p. 1831, doi. 10.1002/sec.1037
- By:
- Publication type:
- Article
Special issue on recent advances in network and information security-security and communication networks journal.
- Published in:
- 2015
- By:
- Publication type:
- Editorial