Found: 116
Select item for more details and to access through your institution.
A Survey of techniques for fine-grained web traffic identification and classification.
- Published in:
- Mathematical Biosciences & Engineering, 2022, v. 19, n. 3, p. 2996, doi. 10.3934/mbe.2022138
- By:
- Publication type:
- Article
Optimizing the Joint Source/Network Coding for Video Streaming over Multi-hop Wireless Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 4, p. 800, doi. 10.3837/tiis.2013.04.011
- By:
- Publication type:
- Article
Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 4, p. 591, doi. 10.1007/s11277-011-0422-4
- By:
- Publication type:
- Article
Editorial: Special Issue on 'Advances in Mobile IPv6 and Network-Based Localized Mobility Management'.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
An Optimization-Based Scheme for Efficient Virtual Machine Placement.
- Published in:
- International Journal of Parallel Programming, 2014, v. 42, n. 5, p. 853, doi. 10.1007/s10766-013-0274-5
- By:
- Publication type:
- Article
Guest Editorial: Advances In Security and Privacy Technologies for Forthcoming Smart Systems, Services, Computing, and Networks.
- Published in:
- Intelligent Automation & Soft Computing, 2019, v. 25, n. 1, p. 117
- By:
- Publication type:
- Article
Special Section on Advanced Technologies for Homeland and Cyber Defense.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 343, doi. 10.1080/10798587.2016.1146504
- By:
- Publication type:
- Article
Special Section on Advances in IT Convergence Technologies.
- Published in:
- Intelligent Automation & Soft Computing, 2014, v. 20, n. 1, p. 1, doi. 10.1080/10798587.2014.886816
- By:
- Publication type:
- Article
CONTEXT-AWARE WORKFLOW MANAGEMENT FOR INTELLIGENT NAVIGATION APPLICATIONS IN PERVASIVE ENVIRONMENTS.
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 4, p. 607, doi. 10.1080/10798587.2010.10643104
- By:
- Publication type:
- Article
A Special Issue of Intelligent Automation and Soft Computing.
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 4, p. 491, doi. 10.1080/10798587.2010.10643095
- By:
- Publication type:
- Article
Adaptive authentication scheme for mobile devices in proxy MIPv6 networks.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 17, p. 2319, doi. 10.1049/iet-com.2016.0480
- By:
- Publication type:
- Article
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 17, p. 3543, doi. 10.3390/electronics12173543
- By:
- Publication type:
- Article
An exploration of cache collaboration in information-centric network.
- Published in:
- International Journal of Communication Systems, 2014, v. 27, n. 9, p. 1243, doi. 10.1002/dac.2773
- By:
- Publication type:
- Article
caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.
- Published in:
- International Journal of Communication Systems, 2010, v. 23, n. 11, p. 1382, doi. 10.1002/dac.1113
- By:
- Publication type:
- Article
Intelligent technologies and applications for big data analytics.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Advanced Technologies and Applications in Ad Hoc and Sensor Wireless Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2012, v. 15, n. 1, p. 1
- By:
- Publication type:
- Article
A software classification scheme using binary-level characteristics for efficient software filtering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 2, p. 595, doi. 10.1007/s00500-016-2357-x
- By:
- Publication type:
- Article
Long-term location privacy protection for location-based services in mobile cloud computing.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 5, p. 1735, doi. 10.1007/s00500-015-1703-8
- By:
- Publication type:
- Article
Special issue on natural and secure computing in modern soft computing application.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
Intelligent healthcare service based on context inference using smart device.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2014, v. 18, n. 12, p. 2577, doi. 10.1007/s00500-014-1420-8
- By:
- Publication type:
- Article
Opportunistic sharing scheme for spectrum allocation in wireless virtualization.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2014, v. 18, n. 9, p. 1685, doi. 10.1007/s00500-014-1267-z
- By:
- Publication type:
- Article
Soft computing for security services in smart and ubiquitous environments.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Empirical Mode Decomposition-empowered Network Traffic Anomaly Detection for Secure Multipath TCP Communications.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 6, p. 2254, doi. 10.1007/s11036-022-02005-6
- By:
- Publication type:
- Article
Editorial: Security and Privacy in Computing and Communications.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1407, doi. 10.1007/s11036-020-01683-4
- By:
- Publication type:
- Article
A Fault Tolerant Mechanism for UE Authentication in 5G Networks.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1650, doi. 10.1007/s11036-019-01502-5
- By:
- Publication type:
- Article
Acceleration Feature Extraction of Human Body Based on Wearable Devices.
- Published in:
- Energies (19961073), 2021, v. 14, n. 4, p. 924, doi. 10.3390/en14040924
- By:
- Publication type:
- Article
Data-Intensive Task Scheduling for Heterogeneous Big Data Analytics in IoT System.
- Published in:
- Energies (19961073), 2020, v. 13, n. 17, p. 4508, doi. 10.3390/en13174508
- By:
- Publication type:
- Article
LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems.
- Published in:
- Energies (19961073), 2018, v. 11, n. 3, p. 573, doi. 10.3390/en11030573
- By:
- Publication type:
- Article
Next generation mobility management.
- Published in:
- Wireless Communications & Mobile Computing, 2011, v. 11, n. 4, p. 443, doi. 10.1002/wcm.1136
- By:
- Publication type:
- Article
Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5346596
- By:
- Publication type:
- Article
A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies.
- Published in:
- Computer Science & Information Systems, 2014, v. 11, n. 3, p. 1001, doi. 10.2298/CSIS130915061J
- By:
- Publication type:
- Article
Topographic-Awareness and Situational-Perception Based Mobility Model with Artificial Bee Colony Algorithm for Tactical MANET.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 725, doi. 10.2298/CSIS120714031H
- By:
- Publication type:
- Article
The Throughput Critical Condition Study for Reliable Multipath Transport.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 567, doi. 10.2298/CSIS120725024S
- By:
- Publication type:
- Article
Guest editorial: A brief overview of data leakage and insider threats.
- Published in:
- 2013
- By:
- Publication type:
- Editorial
SMDFbs: Specification-Based Misbehavior Detection for False Base Stations.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 23, p. 9504, doi. 10.3390/s23239504
- By:
- Publication type:
- Article
APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 12, p. 5501, doi. 10.3390/s23125501
- By:
- Publication type:
- Article
Decentralized Policy Coordination in Mobile Sensing with Consensual Communication.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 24, p. 9584, doi. 10.3390/s22249584
- By:
- Publication type:
- Article
A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 15, p. 5506, doi. 10.3390/s22155506
- By:
- Publication type:
- Article
Study and Investigation on 5G Technology: A Systematic Review.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 1, p. 26, doi. 10.3390/s22010026
- By:
- Publication type:
- Article
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 24, p. 8383, doi. 10.3390/s21248383
- By:
- Publication type:
- Article
Bluetooth 5.1: An Analysis of Direction Finding Capability for High-Precision Location Services.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 11, p. 3589, doi. 10.3390/s21113589
- By:
- Publication type:
- Article
Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification †.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 8, p. 2859, doi. 10.3390/s21082859
- By:
- Publication type:
- Article
Decentralized Trusted Data Sharing Management on Internet of Vehicle Edge Computing (IoVEC) Networks Using Consortium Blockchain.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 7, p. 2410, doi. 10.3390/s21072410
- By:
- Publication type:
- Article
Latency-Optimal Computational Offloading Strategy for Sensitive Tasks in Smart Homes.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 7, p. 2347, doi. 10.3390/s21072347
- By:
- Publication type:
- Article
Unsupervised Fault Detection on Unmanned Aerial Vehicles: Encoding and Thresholding Approach †.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 6, p. 2208, doi. 10.3390/s21062208
- By:
- Publication type:
- Article
Detecting Anomalous Transactions via an IoT Based Application: A Machine Learning Approach for Horse Racing Betting †.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 6, p. 2039, doi. 10.3390/s21062039
- By:
- Publication type:
- Article
Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 6, p. 2057, doi. 10.3390/s21062057
- By:
- Publication type:
- Article
Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption †.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 6, p. 2024, doi. 10.3390/s21062024
- By:
- Publication type:
- Article
Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 6, p. 1976, doi. 10.3390/s21061976
- By:
- Publication type:
- Article
LSTM Networks Using Smartphone Data for Sensor-Based Human Activity Recognition in Smart Homes.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 5, p. 1636, doi. 10.3390/s21051636
- By:
- Publication type:
- Article