Found: 70
Select item for more details and to access through your institution.
Construction of node- and link-fault-tolerant virtual backbones in wireless networks.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 12, p. 13050, doi. 10.1007/s11227-023-05180-9
- By:
- Publication type:
- Article
Chain-based big data access control infrastructure.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 10, p. 4945, doi. 10.1007/s11227-018-2308-7
- By:
- Publication type:
- Article
Group‐based key array authentication protocol in radio frequency identification systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 6, p. 290, doi. 10.1049/iet-ifs.2012.0241
- By:
- Publication type:
- Article
A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services.
- Published in:
- Sustainability (2071-1050), 2018, v. 10, n. 5, p. 1337, doi. 10.3390/su10051337
- By:
- Publication type:
- Article
Attention-mechanism-based tracking method for intelligent Internet of vehicles.
- Published in:
- International Journal of Distributed Sensor Networks, 2018, v. 14, n. 12, p. 1, doi. 10.1177/1550147718805946
- By:
- Publication type:
- Article
Attention-mechanism-based tracking method for intelligent Internet of vehicles.
- Published in:
- International Journal of Distributed Sensor Networks, 2018, v. 14, n. 10, p. 1, doi. 10.1177/1550147718805946
- By:
- Publication type:
- Article
Sink Location Protection Protocols Based on Packet Sending Rate Adjustment.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/6354514
- By:
- Publication type:
- Article
A Co-Design-Based Reliable Low-Latency and Energy-Efficient Transmission Protocol for UWSNs.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 21, p. 6370, doi. 10.3390/s20216370
- By:
- Publication type:
- Article
An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 21, p. 6287, doi. 10.3390/s20216287
- By:
- Publication type:
- Article
An Adaptive Network Coding Scheme for Multipath Transmission in Cellular-Based Vehicular Networks.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 20, p. 5902, doi. 10.3390/s20205902
- By:
- Publication type:
- Article
A Graph Convolutional Network-Based Deep Reinforcement Learning Approach for Resource Allocation in a Cognitive Radio Network.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 18, p. 5216, doi. 10.3390/s20185216
- By:
- Publication type:
- Article
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks †.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 3, p. 657, doi. 10.3390/s20030657
- By:
- Publication type:
- Article
An Anti-Interference Scheme for UAV Data Links in Air–Ground Integrated Vehicular Networks.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 21, p. 4742, doi. 10.3390/s19214742
- By:
- Publication type:
- Article
A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 6, p. 1274, doi. 10.3390/s19061274
- By:
- Publication type:
- Article
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 5, p. 1235, doi. 10.3390/s19051235
- By:
- Publication type:
- Article
A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 5, p. 1184, doi. 10.3390/s19051184
- By:
- Publication type:
- Article
Adversarial Samples on Android Malware Detection Systems for IoT Systems.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 4, p. 974, doi. 10.3390/s19040974
- By:
- Publication type:
- Article
A Self-Selective Correlation Ship Tracking Method for Smart Ocean Systems.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 4, p. 821, doi. 10.3390/s19040821
- By:
- Publication type:
- Article
Vehicle-Type Detection Based on Compressed Sensing and Deep Learning in Vehicular Networks.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 12, p. 4500, doi. 10.3390/s18124500
- By:
- Publication type:
- Article
AOA-Based Three-Dimensional Multi-Target Localization in Industrial WSNs for LOS Conditions.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 8, p. 2727, doi. 10.3390/s18082727
- By:
- Publication type:
- Article
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 8, p. 2630, doi. 10.3390/s18082630
- By:
- Publication type:
- Article
Market Model for Resource Allocation in Emerging Sensor Networks with Reinforcement Learning.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 12, p. 2021, doi. 10.3390/s16122021
- By:
- Publication type:
- Article
Radio resource coordination and scheduling scheme in ultra-dense cloud-based small cell networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2018, v. 2018, n. 1, p. 1, doi. 10.1186/s13638-018-1150-1
- By:
- Publication type:
- Article
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 23, p. 7977, doi. 10.1007/s00500-017-2745-x
- By:
- Publication type:
- Article
An Automated Refactoring Approach to Improve IoT Software Quality.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 1, p. 413, doi. 10.3390/app10010413
- By:
- Publication type:
- Article
When Energy Trading Meets Blockchain in Electrical Power System: The State of the Art.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 8, p. 1561, doi. 10.3390/app9081561
- By:
- Publication type:
- Article
Robust Device-Free Intrusion Detection Using Physical Layer Information of WiFi Signals.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 1, p. 175, doi. 10.3390/app9010175
- By:
- Publication type:
- Article
Energy-Efficient Caching for Mobile Edge Computing in 5G Networks.
- Published in:
- Applied Sciences (2076-3417), 2017, v. 7, n. 6, p. 557, doi. 10.3390/app7060557
- By:
- Publication type:
- Article
TamForen: A tamper‐proof cloud forensic framework.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 4, p. 1, doi. 10.1002/ett.4178
- By:
- Publication type:
- Article
ECBCM: A prestige‐based edge computing blockchain security consensus model.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2021, v. 32, n. 6, p. 1, doi. 10.1002/ett.4015
- By:
- Publication type:
- Article
Blockchain‐based privacy‐preserving valet parking for self‐driving vehicles.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2021, v. 32, n. 4, p. 1, doi. 10.1002/ett.4239
- By:
- Publication type:
- Article
CompRess: Composing overlay service resources for end‐to‐end network slices using semantic user intents.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2020, v. 31, n. 1, p. N.PAG, doi. 10.1002/ett.3728
- By:
- Publication type:
- Article
Caching mechanism for mobile edge computing in V2I networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 8, p. N.PAG, doi. 10.1002/ett.3689
- By:
- Publication type:
- Article
Reinforcement learning–based QoS/QoE‐aware service function chaining in software‐driven 5G slices.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 11, p. N.PAG, doi. 10.1002/ett.3477
- By:
- Publication type:
- Article
System Log Detection Model Based on Conformal Prediction.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 2, p. 232, doi. 10.3390/electronics9020232
- By:
- Publication type:
- Article
Dynamic Stress Measurement with Sensor Data Compensation.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 8, p. 859, doi. 10.3390/electronics8080859
- By:
- Publication type:
- Article
Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems.
- Published in:
- Journal of Sensor & Actuator Networks, 2018, v. 7, n. 2, p. 21, doi. 10.3390/jsan7020021
- By:
- Publication type:
- Article
Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/4074272
- By:
- Publication type:
- Article
On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2010, v. 6, n. 1, p. 1, doi. 10.1155/2010/563156
- By:
- Publication type:
- Article
On Deployment of Multiple Base Stations for Energy-Efficient Communication in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2010, v. 6, n. 1, p. 1, doi. 10.1155/2010/563156
- By:
- Publication type:
- Article
Publishing histograms with outliers under data differential privacy.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2313, doi. 10.1002/sec.1493
- By:
- Publication type:
- Article
Achieving data privacy on hybrid cloud.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3771, doi. 10.1002/sec.1298
- By:
- Publication type:
- Article
Verifying cloud service-level agreement by a third-party auditor.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 3, p. 492, doi. 10.1002/sec.740
- By:
- Publication type:
- Article
Self-protecting networking using dynamic p-cycle construction within link capacity constraint.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 6, p. 689, doi. 10.1002/sec.364
- By:
- Publication type:
- Article
Identifying Control and Management Plane Poison Message Failure by K-Nearest Neighbor Method.
- Published in:
- Journal of Network & Systems Management, 2006, v. 14, n. 2, p. 243, doi. 10.1007/s10922-006-9027-8
- By:
- Publication type:
- Article
Maintaining Differentiated Coverage in Heterogeneous Sensor Networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2005, v. 2005, n. 4, p. 565
- By:
- Publication type:
- Article
Low complexity closed‐loop strategy for mmWave communication in industrial intelligent systems.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 12, p. 10813, doi. 10.1002/int.22953
- By:
- Publication type:
- Article
Multi-layer security scheme for implantable medical devices.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 9, p. 4347, doi. 10.1007/s00521-018-3819-0
- By:
- Publication type:
- Article
Placement delivery array design for the coded caching scheme in medical data sharing.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 3, p. 867, doi. 10.1007/s00521-019-04042-x
- By:
- Publication type:
- Article
An effective copyright‐protected content delivery scheme for P2P file sharing networks.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 16, p. N.PAG, doi. 10.1002/dac.3476
- By:
- Publication type:
- Article