派博傳思國際中心

標題: Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P [打印本頁]

作者: exterminate    時間: 2025-3-21 19:43
書目名稱Cloud Computing and Security影響因子(影響力)




書目名稱Cloud Computing and Security影響因子(影響力)學科排名




書目名稱Cloud Computing and Security網(wǎng)絡公開度




書目名稱Cloud Computing and Security網(wǎng)絡公開度學科排名




書目名稱Cloud Computing and Security被引頻次




書目名稱Cloud Computing and Security被引頻次學科排名




書目名稱Cloud Computing and Security年度引用




書目名稱Cloud Computing and Security年度引用學科排名




書目名稱Cloud Computing and Security讀者反饋




書目名稱Cloud Computing and Security讀者反饋學科排名





作者: 充氣球    時間: 2025-3-22 00:17

作者: Thymus    時間: 2025-3-22 03:49
FPAP: Fast Pre-distribution Authentication Protocol for V2Iser’s identity and avoids the private information leakage. In this paper, a fast authentication protocol is proposed using the group communication and proactive authentication, in which the authentication is achieved by the symmetric encryption. Therefore, it is more efficient. Moreover, the trade-o
作者: SLAY    時間: 2025-3-22 06:22
CACA-UAN: A Context-Aware Communication Approach Based on the Underwater Acoustic Sensor Networkent years. Among these applications, the communication between the devices is crucial for providing the better service to the users. To facilitate the communication, effective communication approaches need to be developed, however, underwater communication may pose more challenges than terrestrial c
作者: Atrium    時間: 2025-3-22 12:46
Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Gridtacks and have more variants. Time-based Pricing (TBP) is an attracting feature of Smart Grid, which supports real-time pricing and billing. However, adversaries could utilize TBP to commit NTL frauds, and we name them as TNTL frauds. Different from NTL frauds which “steal” electricity, TNTL frauds
作者: Coronary    時間: 2025-3-22 13:31
Social Influence Analysis Based on Modeling Interactions in Dynamic Social Networks: A Case Studycations. By combining topology in mathematics with field theory in physics, topology potential, which sets up a virtual field via a topology space to reflect individual activities, local effects and preferential attachments in different interactions, has been proposed to model mutual effects between
作者: Coronary    時間: 2025-3-22 20:28

作者: Spina-Bifida    時間: 2025-3-23 00:51

作者: Fissure    時間: 2025-3-23 02:36
Narthil: Push the Limit of Cross Technology Coexistence for Interfered PreamblesExisting approaches either suffer from the constraint of the need of clean preamble, or requiring technological similarities among cross technology systems..This paper makes the first attempt for tackling this stalemate. We propose Narthil (Narthil is a sword in The Lord of the Rings and The Silmari
作者: hallow    時間: 2025-3-23 06:26
VANET 2.0: Integrating Visible Light with Radio Frequency Communications for Safety ApplicationsT employing IEEE 802.11p only suffers from broadcast storm problems at a high vehicle density, many clustering schemes have been proposed and yet still can’t effectively address the interference problems. Later, some scholars envisioned applying Visible Light Communications (VLC) as the wireless com
作者: 有權威    時間: 2025-3-23 13:31
Temperature Error Correction Based on BP Neural Network in Meteorological Wireless Sensor Networkstics of easy deployment and high mobility. But low cost sensor is easily affected by external environment, often lead to inaccurate measurements. Previous research has shown that there is a close relationship between AT and solar radiation (SR). Therefore, We designed a back propagation (BP) neural
作者: Cirrhosis    時間: 2025-3-23 16:17
Improving Data Credibility for Mobile Crowdsensing with Clustering and Logical Reasoninghe unpredictable intention and various capabilities of device owners expose the application to potential dishonest and malicious contributions, bringing forth the important issues of data credibility assurance. Existed works generally attempt to increase data confidence level with the guide of reput
作者: 玷污    時間: 2025-3-23 20:49
PTOM: Profit Concerning and Truthful Online Spectrum Double Auction Mechanismtrum double auction problem and propose a Profit concerning and Truthful Online spectrum double auction Mechanism (PTOM). Different from most previous works, we consider the dynamic arrival of primary users (PUs) and secondary users (SUs) and allow SUs to request distinct time slots for using the sp
作者: Obsessed    時間: 2025-3-24 00:35

作者: IVORY    時間: 2025-3-24 04:51
Compressive Sensing Based on Energy-Efficient Communicationf sensors. In this paper, a mixed idea has been proposed based on classification for actual environments. At its heart lies a simple yet effective thought that the number of transmission of bottom sensors by no-CS schemes is less than ones by CS. In experiments, our scheme has been proved valuable a
作者: 腐敗    時間: 2025-3-24 08:26
Energy-Efficient Data Collection Algorithms Based on Clustering for Mobility-Enabled Wireless Sensorroblem for load balancing with mobility-assisted features. In particular, we present a cluster-based network structure, in which sensor nodes are partitioned into layers according to transmission radius. Based on a distributed scheme for clustering and cluster heads, rendezvous points (RPs) are intr
作者: Multiple    時間: 2025-3-24 11:54

作者: 全部    時間: 2025-3-24 16:53

作者: VOC    時間: 2025-3-24 22:17
https://doi.org/10.1007/978-3-642-72533-3ently and cheaply. In a crowdsensing system, the sensing tasks are divided into many small sub-tasks that can be easily accomplished by smartphone users, and the companies take advantage of the data collected by all the smartphone users to improve the quality of their services. Efficient task assign
作者: Scintigraphy    時間: 2025-3-25 01:45
,Gerinnungsst?rungen im Schock,ser’s identity and avoids the private information leakage. In this paper, a fast authentication protocol is proposed using the group communication and proactive authentication, in which the authentication is achieved by the symmetric encryption. Therefore, it is more efficient. Moreover, the trade-o
作者: 溫室    時間: 2025-3-25 05:59

作者: ethereal    時間: 2025-3-25 08:32

作者: 沒有希望    時間: 2025-3-25 14:44

作者: cyanosis    時間: 2025-3-25 15:58
Zur Pathophysiologie des Schocks,host networks. Attack graph is a useful tool for penetration testing to analyze the relevance of vulnerabilities between hosts and provides a visual view for attack path planning. However, previous works on attack graph generation are inefficient and not applicable to practical penetration testing p
作者: 利用    時間: 2025-3-25 22:29

作者: 收養(yǎng)    時間: 2025-3-26 01:29

作者: 哀求    時間: 2025-3-26 05:08
Scholarly Adventures in Digital HumanitiesT employing IEEE 802.11p only suffers from broadcast storm problems at a high vehicle density, many clustering schemes have been proposed and yet still can’t effectively address the interference problems. Later, some scholars envisioned applying Visible Light Communications (VLC) as the wireless com
作者: Blemish    時間: 2025-3-26 10:42
https://doi.org/10.1007/978-3-031-02299-9stics of easy deployment and high mobility. But low cost sensor is easily affected by external environment, often lead to inaccurate measurements. Previous research has shown that there is a close relationship between AT and solar radiation (SR). Therefore, We designed a back propagation (BP) neural
作者: Filibuster    時間: 2025-3-26 16:13
https://doi.org/10.1007/978-3-030-85784-4he unpredictable intention and various capabilities of device owners expose the application to potential dishonest and malicious contributions, bringing forth the important issues of data credibility assurance. Existed works generally attempt to increase data confidence level with the guide of reput
作者: 擴音器    時間: 2025-3-26 16:48

作者: neurologist    時間: 2025-3-26 23:17
https://doi.org/10.1007/978-3-030-85784-4 Electricity theft is not limited to the traditional methods, such as bypassing power lines. In Smart Grid, adversaries could gain illegal benefit from the utility via various new ways, and we call this class of behavior as Non-Technical Loss (NTL) fraud. In this paper, we study various security iss
作者: 分離    時間: 2025-3-27 01:49

作者: HUSH    時間: 2025-3-27 05:56
Lynée Lewis Gaillet,Letizia Guglielmoroblem for load balancing with mobility-assisted features. In particular, we present a cluster-based network structure, in which sensor nodes are partitioned into layers according to transmission radius. Based on a distributed scheme for clustering and cluster heads, rendezvous points (RPs) are intr
作者: 相一致    時間: 2025-3-27 10:58
Introduction: Negotiating the Terrain,no monitoring. Harsh environments can easily cause the network to be unconnected, which lead to unable to collect data by multi-hops. The development of the Unmanned Aerial Vehicles (UAVs) makes it possible to collect data from ground sensor nodes by UAVs, and the UAV trajectory planning is necessar
作者: Negligible    時間: 2025-3-27 15:34

作者: parallelism    時間: 2025-3-27 18:06

作者: 捕鯨魚叉    時間: 2025-3-28 01:07
Compressive Sensing Based on Energy-Efficient Communicationf sensors. In this paper, a mixed idea has been proposed based on classification for actual environments. At its heart lies a simple yet effective thought that the number of transmission of bottom sensors by no-CS schemes is less than ones by CS. In experiments, our scheme has been proved valuable and feasible.
作者: 擴音器    時間: 2025-3-28 03:36
Xingming Sun,Alex Liu,Elisa BertinoIncludes supplementary material:
作者: SOBER    時間: 2025-3-28 08:38

作者: CROW    時間: 2025-3-28 14:02
https://doi.org/10.1007/978-3-031-02299-9To energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
作者: 磨碎    時間: 2025-3-28 17:58
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
作者: 紅潤    時間: 2025-3-28 19:44
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr
作者: 侵略    時間: 2025-3-29 02:47

作者: 煤渣    時間: 2025-3-29 03:08
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..
作者: Trypsin    時間: 2025-3-29 07:30

作者: Gossamer    時間: 2025-3-29 14:30
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.
作者: Armory    時間: 2025-3-29 16:33
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
作者: 運動性    時間: 2025-3-29 20:14
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
作者: 賄賂    時間: 2025-3-30 02:27

作者: 加強防衛(wèi)    時間: 2025-3-30 07:17

作者: Banquet    時間: 2025-3-30 10:36
https://doi.org/10.1007/978-3-030-85784-4e crowdsensing application without requiring reputation knowledge. By integrating data clustering with logical reasoning, CLOR is able to formally separate false and normal data, make credibility assessment, and filter out the false ingredient. Simulation results show that improved data credibility can be achieved effectively with our scheme.
作者: 放棄    時間: 2025-3-30 16:02

作者: 挫敗    時間: 2025-3-30 19:43

作者: 使聲音降低    時間: 2025-3-31 00:45

作者: ERUPT    時間: 2025-3-31 02:51
Improving Data Credibility for Mobile Crowdsensing with Clustering and Logical Reasoninge crowdsensing application without requiring reputation knowledge. By integrating data clustering with logical reasoning, CLOR is able to formally separate false and normal data, make credibility assessment, and filter out the false ingredient. Simulation results show that improved data credibility can be achieved effectively with our scheme.
作者: 造反,叛亂    時間: 2025-3-31 05:09
PTOM: Profit Concerning and Truthful Online Spectrum Double Auction Mechanismbid, we design an efficient admission and pricing rule to improve the auctioneer’s profit. Theoretical analyses are provided to prove that our mechanism has nice economic properties including individual rationality, budget-balance and resistance of time-based and value-based cheating.
作者: locus-ceruleus    時間: 2025-3-31 09:48

作者: ANT    時間: 2025-3-31 14:30
Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
作者: 大溝    時間: 2025-3-31 21:09





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
蕉岭县| 格尔木市| 永和县| 邓州市| 文安县| 崇州市| 乌拉特后旗| 喀什市| 宁都县| 平凉市| 杭锦旗| 梅河口市| 紫云| 阿鲁科尔沁旗| 九台市| 林口县| 淮北市| 外汇| 会宁县| 谢通门县| 贵港市| 弋阳县| 教育| 图木舒克市| 靖江市| 沾益县| 清水河县| 卢氏县| 印江| 榆社县| 绥江县| 土默特右旗| 阜南县| 丹寨县| 视频| 伽师县| 丹凤县| 琼中| 佳木斯市| 胶州市| 阿鲁科尔沁旗|