Found: 6
Select item for more details and to access through your institution.
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure.
- Published in:
- Journal of Computing & Security, 2022, v. 9, n. 1, p. 31, doi. 10.22108/JCS.2022.131452.1086
- By:
- Publication type:
- Article
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset.
- Published in:
- Journal of Computing & Security, 2022, v. 9, n. 1, p. 57, doi. 10.22108/JCS.2022.131400.1085
- By:
- Publication type:
- Article
Gaussian Linear Regression Crossover for Genetic Algorithms.
- Published in:
- Journal of Computing & Security, 2022, v. 9, n. 1, p. 45, doi. 10.22108/JCS.2022.131269.1084
- By:
- Publication type:
- Article
DiCuPIT: Distributed Cuckoo Filter-Based Pending Interest Table.
- Published in:
- Journal of Computing & Security, 2022, v. 9, n. 1, p. 85, doi. 10.22108/JCS.2022.132747.1091
- By:
- Publication type:
- Article
Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization.
- Published in:
- Journal of Computing & Security, 2022, v. 9, n. 1, p. 71, doi. 10.22108/JCS.2022.131709.1087
- By:
- Publication type:
- Article
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts.
- Published in:
- Journal of Computing & Security, 2022, v. 9, n. 1, p. 1, doi. 10.22108/jcs.2021.130065.1080
- By:
- Publication type:
- Article