Found: 6
Select item for more details and to access through your institution.
Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments.
- Published in:
- Telecommunication Systems, 2015, v. 60, n. 2, p. 303, doi. 10.1007/s11235-015-0031-8
- By:
- Publication type:
- Article
Dynamic scheduling with energy-efficient transmissions in hierarchical wireless sensor networks.
- Published in:
- Telecommunication Systems, 2015, v. 60, n. 1, p. 95, doi. 10.1007/s11235-014-9924-1
- By:
- Publication type:
- Article
A two-stage intrusion detection approach for software-defined IoT networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 16, p. 10935, doi. 10.1007/s00500-021-05809-y
- By:
- Publication type:
- Article
A novel approach for mobile malware classification and detection in Android systems.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3529, doi. 10.1007/s11042-018-6498-z
- By:
- Publication type:
- Article
In Vivo Investigation of the Biostimulatory and Rejuvenating Effects of Small-Particle Cross-linked Hyaluronic Acid Injections in Photoaged Human Skin.
- Published in:
- Aesthetic Surgery Journal, 2023, v. 43, n. 5, p. 595, doi. 10.1093/asj/sjac333
- By:
- Publication type:
- Article
Building a mobile movie recommendation service by user rating and APP usage with linked data on Hadoop.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 3, p. 3383, doi. 10.1007/s11042-016-3833-0
- By:
- Publication type:
- Article