Puzzle Zeitvertreib Beste 4K Filme Beste Multimedia-Lernspiele % SALE %

Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 Internation


Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 Internation
119.12 CHF
Versandkostenfrei

Lieferzeit: 7-14 Werktage

  • 10462908


Beschreibung

The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017).- MTIV: A Trustworthiness Determination Approach for Threat Intelligence.- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV.- Secure Transfer Protocol Between App and Device of Internet of Things.- Rogue Access Points Detection Based on Theory of SemiSupervised Learning.- Phishing Detection Method Based on Borderline-Smote Deep Belief Network.- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network.- A SYN Flood Detection Method Based on Self - similarity in Network Traffic.- Annotating Network Service Fault based on Temporal Interval Relations.- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017).- An Anonymous Identity-Based Authentication Scheme in Vector Network.- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017).- Two Improved Anonymous Authentication Methods for PCS.- Multi-Match Segments Similarity Join Algorithm Based on MapReduce.- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser.- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks.- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.- Game Theoretical Analysis on System Adoption and Acceptance: A Review.- A Novel Bivariate Entropy-based Network Anomaly Detection System.- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.- Neural Network based Web Log Analysis for Web Intrusion Detection.- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017).- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach.- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis.- Cloud Ownership and Reliability - Issues and Developments.- A Trust-based Service Self-Organizing Model for Cloud Market.- A Reliable Resource Scheduling for Network Function Virtualization.- On Global Resource Allocation in Clusters for Data Analytics.- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors.- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017).- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks.- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways.- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things.- Localizing Wireless Jamming Attacks with Minimal Network Resources.- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017).- An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm.- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm.- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET).- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design.- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home.- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks.- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). - Password Recovery for ZIP Files Based on ARM-FPGA Cluster.- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks.- An FPGA-based Algorithm to Accelerate Regular Expression Matching.- A Collaborative Filtering Recommendation Algorithm Based on Score Classification.- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine.- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in t

Eigenschaften

Breite: 154
Gewicht: 1293 g
Höhe: 238
Länge: 41
Seiten: 855
Sprachen: Englisch
Autor: Guojun Wang, Kim-Kwang Raymond Choo, Mohammed Atiquzzaman, Zheng Yan

Bewertung

Bewertungen werden nach Überprüfung freigeschaltet.

Die mit einem * markierten Felder sind Pflichtfelder.

Ich habe die Datenschutzbestimmungen zur Kenntnis genommen.

Zuletzt angesehen

eUniverse.ch - zur Startseite wechseln © 2021 Nova Online Media Retailing GmbH