Found: 13
Select item for more details and to access through your institution.
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 3, p. 227
- By:
- Publication type:
- Article
Formal modeling and verification of security controls for multimedia systems in the cloud.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 21, p. 22845, doi. 10.1007/s11042-017-4853-0
- By:
- Publication type:
- Article
Blockchain based general data protection regulation compliant data breach detection system.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.1882
- By:
- Publication type:
- Article
Anonymity-preserving Reputation Management System for health sector.
- Published in:
- PLoS ONE, 2018, v. 13, n. 4, p. 1, doi. 10.1371/journal.pone.0195021
- By:
- Publication type:
- Article
MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed Consensus.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 15, p. 5096, doi. 10.3390/s21155096
- By:
- Publication type:
- Article
F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 14, p. 4933, doi. 10.3390/s21144933
- By:
- Publication type:
- Article
Social Impacts of COVID-19: Predicting the Unpredictability.
- Published in:
- Istanbul Gelisim University Journal of Health Sciences / İstanbul Gelişim Üniversitesi Sağlık Bilimleri Dergisi, 2020, n. 12, p. 484, doi. 10.38079/igusabder.740470
- By:
- Publication type:
- Article
Privacy Preserving for Multiple Sensitive Attributes against Fingerprint Correlation Attack Satisfying c-Diversity.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8416823
- By:
- Publication type:
- Article
China-Iran Strategic Partnership: Implications for India.
- Published in:
- Chinese Journal of International Review, 2021, v. 3, n. 2, p. 1, doi. 10.1142/S2630531321500086
- By:
- Publication type:
- Article
θ-Sensitive k-Anonymity: An Anonymization Model for IoT based Electronic Health Records.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 5, p. 716, doi. 10.3390/electronics9050716
- By:
- Publication type:
- Article
RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments.
- Published in:
- Journal of Sensor & Actuator Networks, 2017, v. 6, n. 3, p. 17, doi. 10.3390/jsan6030017
- By:
- Publication type:
- Article
Afghanistan and Central Asian States (Turkmenistan, Uzbekistan and Tajikistan): Post 2014.
- Published in:
- FWU Journal of Social Sciences, 2015, v. 1, p. 44
- By:
- Publication type:
- Article
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 3, p. 493, doi. 10.1007/s11036-017-0867-0
- By:
- Publication type:
- Article