標題: Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P [打印本頁] 作者: exterminate 時間: 2025-3-21 19:43
書目名稱Cloud Computing and Security影響因子(影響力)
書目名稱Cloud Computing and Security影響因子(影響力)學科排名
書目名稱Cloud Computing and Security網(wǎng)絡公開度
書目名稱Cloud Computing and Security網(wǎng)絡公開度學科排名
書目名稱Cloud Computing and Security被引頻次
書目名稱Cloud Computing and Security被引頻次學科排名
書目名稱Cloud Computing and Security年度引用
書目名稱Cloud Computing and Security年度引用學科排名
書目名稱Cloud Computing and Security讀者反饋
書目名稱Cloud Computing and Security讀者反饋學科排名
作者: 充氣球 時間: 2025-3-22 00:17 作者: Thymus 時間: 2025-3-22 03:49
FPAP: Fast Pre-distribution Authentication Protocol for V2Iser’s identity and avoids the private information leakage. In this paper, a fast authentication protocol is proposed using the group communication and proactive authentication, in which the authentication is achieved by the symmetric encryption. Therefore, it is more efficient. Moreover, the trade-o作者: SLAY 時間: 2025-3-22 06:22
CACA-UAN: A Context-Aware Communication Approach Based on the Underwater Acoustic Sensor Networkent years. Among these applications, the communication between the devices is crucial for providing the better service to the users. To facilitate the communication, effective communication approaches need to be developed, however, underwater communication may pose more challenges than terrestrial c作者: Atrium 時間: 2025-3-22 12:46
Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Gridtacks and have more variants. Time-based Pricing (TBP) is an attracting feature of Smart Grid, which supports real-time pricing and billing. However, adversaries could utilize TBP to commit NTL frauds, and we name them as TNTL frauds. Different from NTL frauds which “steal” electricity, TNTL frauds 作者: Coronary 時間: 2025-3-22 13:31
Social Influence Analysis Based on Modeling Interactions in Dynamic Social Networks: A Case Studycations. By combining topology in mathematics with field theory in physics, topology potential, which sets up a virtual field via a topology space to reflect individual activities, local effects and preferential attachments in different interactions, has been proposed to model mutual effects between作者: Coronary 時間: 2025-3-22 20:28 作者: Spina-Bifida 時間: 2025-3-23 00:51 作者: Fissure 時間: 2025-3-23 02:36
Narthil: Push the Limit of Cross Technology Coexistence for Interfered PreamblesExisting approaches either suffer from the constraint of the need of clean preamble, or requiring technological similarities among cross technology systems..This paper makes the first attempt for tackling this stalemate. We propose Narthil (Narthil is a sword in The Lord of the Rings and The Silmari作者: hallow 時間: 2025-3-23 06:26
VANET 2.0: Integrating Visible Light with Radio Frequency Communications for Safety ApplicationsT employing IEEE 802.11p only suffers from broadcast storm problems at a high vehicle density, many clustering schemes have been proposed and yet still can’t effectively address the interference problems. Later, some scholars envisioned applying Visible Light Communications (VLC) as the wireless com作者: 有權威 時間: 2025-3-23 13:31
Temperature Error Correction Based on BP Neural Network in Meteorological Wireless Sensor Networkstics of easy deployment and high mobility. But low cost sensor is easily affected by external environment, often lead to inaccurate measurements. Previous research has shown that there is a close relationship between AT and solar radiation (SR). Therefore, We designed a back propagation (BP) neural作者: Cirrhosis 時間: 2025-3-23 16:17
Improving Data Credibility for Mobile Crowdsensing with Clustering and Logical Reasoninghe unpredictable intention and various capabilities of device owners expose the application to potential dishonest and malicious contributions, bringing forth the important issues of data credibility assurance. Existed works generally attempt to increase data confidence level with the guide of reput作者: 玷污 時間: 2025-3-23 20:49
PTOM: Profit Concerning and Truthful Online Spectrum Double Auction Mechanismtrum double auction problem and propose a Profit concerning and Truthful Online spectrum double auction Mechanism (PTOM). Different from most previous works, we consider the dynamic arrival of primary users (PUs) and secondary users (SUs) and allow SUs to request distinct time slots for using the sp作者: Obsessed 時間: 2025-3-24 00:35 作者: IVORY 時間: 2025-3-24 04:51
Compressive Sensing Based on Energy-Efficient Communicationf sensors. In this paper, a mixed idea has been proposed based on classification for actual environments. At its heart lies a simple yet effective thought that the number of transmission of bottom sensors by no-CS schemes is less than ones by CS. In experiments, our scheme has been proved valuable a作者: 腐敗 時間: 2025-3-24 08:26
Energy-Efficient Data Collection Algorithms Based on Clustering for Mobility-Enabled Wireless Sensorroblem for load balancing with mobility-assisted features. In particular, we present a cluster-based network structure, in which sensor nodes are partitioned into layers according to transmission radius. Based on a distributed scheme for clustering and cluster heads, rendezvous points (RPs) are intr作者: Multiple 時間: 2025-3-24 11:54 作者: 全部 時間: 2025-3-24 16:53 作者: VOC 時間: 2025-3-24 22:17
https://doi.org/10.1007/978-3-642-72533-3ently and cheaply. In a crowdsensing system, the sensing tasks are divided into many small sub-tasks that can be easily accomplished by smartphone users, and the companies take advantage of the data collected by all the smartphone users to improve the quality of their services. Efficient task assign作者: Scintigraphy 時間: 2025-3-25 01:45
,Gerinnungsst?rungen im Schock,ser’s identity and avoids the private information leakage. In this paper, a fast authentication protocol is proposed using the group communication and proactive authentication, in which the authentication is achieved by the symmetric encryption. Therefore, it is more efficient. Moreover, the trade-o作者: 溫室 時間: 2025-3-25 05:59 作者: ethereal 時間: 2025-3-25 08:32 作者: 沒有希望 時間: 2025-3-25 14:44 作者: cyanosis 時間: 2025-3-25 15:58
Zur Pathophysiologie des Schocks,host networks. Attack graph is a useful tool for penetration testing to analyze the relevance of vulnerabilities between hosts and provides a visual view for attack path planning. However, previous works on attack graph generation are inefficient and not applicable to practical penetration testing p作者: 利用 時間: 2025-3-25 22:29 作者: 收養(yǎng) 時間: 2025-3-26 01:29 作者: 哀求 時間: 2025-3-26 05:08
Scholarly Adventures in Digital HumanitiesT employing IEEE 802.11p only suffers from broadcast storm problems at a high vehicle density, many clustering schemes have been proposed and yet still can’t effectively address the interference problems. Later, some scholars envisioned applying Visible Light Communications (VLC) as the wireless com作者: Blemish 時間: 2025-3-26 10:42
https://doi.org/10.1007/978-3-031-02299-9stics of easy deployment and high mobility. But low cost sensor is easily affected by external environment, often lead to inaccurate measurements. Previous research has shown that there is a close relationship between AT and solar radiation (SR). Therefore, We designed a back propagation (BP) neural作者: Filibuster 時間: 2025-3-26 16:13
https://doi.org/10.1007/978-3-030-85784-4he unpredictable intention and various capabilities of device owners expose the application to potential dishonest and malicious contributions, bringing forth the important issues of data credibility assurance. Existed works generally attempt to increase data confidence level with the guide of reput作者: 擴音器 時間: 2025-3-26 16:48 作者: neurologist 時間: 2025-3-26 23:17
https://doi.org/10.1007/978-3-030-85784-4 Electricity theft is not limited to the traditional methods, such as bypassing power lines. In Smart Grid, adversaries could gain illegal benefit from the utility via various new ways, and we call this class of behavior as Non-Technical Loss (NTL) fraud. In this paper, we study various security iss作者: 分離 時間: 2025-3-27 01:49 作者: HUSH 時間: 2025-3-27 05:56
Lynée Lewis Gaillet,Letizia Guglielmoroblem for load balancing with mobility-assisted features. In particular, we present a cluster-based network structure, in which sensor nodes are partitioned into layers according to transmission radius. Based on a distributed scheme for clustering and cluster heads, rendezvous points (RPs) are intr作者: 相一致 時間: 2025-3-27 10:58
Introduction: Negotiating the Terrain,no monitoring. Harsh environments can easily cause the network to be unconnected, which lead to unable to collect data by multi-hops. The development of the Unmanned Aerial Vehicles (UAVs) makes it possible to collect data from ground sensor nodes by UAVs, and the UAV trajectory planning is necessar作者: Negligible 時間: 2025-3-27 15:34 作者: parallelism 時間: 2025-3-27 18:06 作者: 捕鯨魚叉 時間: 2025-3-28 01:07
Compressive Sensing Based on Energy-Efficient Communicationf sensors. In this paper, a mixed idea has been proposed based on classification for actual environments. At its heart lies a simple yet effective thought that the number of transmission of bottom sensors by no-CS schemes is less than ones by CS. In experiments, our scheme has been proved valuable and feasible.作者: 擴音器 時間: 2025-3-28 03:36
Xingming Sun,Alex Liu,Elisa BertinoIncludes supplementary material: 作者: SOBER 時間: 2025-3-28 08:38 作者: CROW 時間: 2025-3-28 14:02
https://doi.org/10.1007/978-3-031-02299-9To energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.作者: 磨碎 時間: 2025-3-28 17:58
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.作者: 紅潤 時間: 2025-3-28 19:44
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr作者: 侵略 時間: 2025-3-29 02:47 作者: 煤渣 時間: 2025-3-29 03:08
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..作者: Trypsin 時間: 2025-3-29 07:30 作者: Gossamer 時間: 2025-3-29 14:30
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.作者: Armory 時間: 2025-3-29 16:33
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.作者: 運動性 時間: 2025-3-29 20:14
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.作者: 賄賂 時間: 2025-3-30 02:27 作者: 加強防衛(wèi) 時間: 2025-3-30 07:17 作者: Banquet 時間: 2025-3-30 10:36
https://doi.org/10.1007/978-3-030-85784-4e crowdsensing application without requiring reputation knowledge. By integrating data clustering with logical reasoning, CLOR is able to formally separate false and normal data, make credibility assessment, and filter out the false ingredient. Simulation results show that improved data credibility can be achieved effectively with our scheme.作者: 放棄 時間: 2025-3-30 16:02 作者: 挫敗 時間: 2025-3-30 19:43 作者: 使聲音降低 時間: 2025-3-31 00:45 作者: ERUPT 時間: 2025-3-31 02:51
Improving Data Credibility for Mobile Crowdsensing with Clustering and Logical Reasoninge crowdsensing application without requiring reputation knowledge. By integrating data clustering with logical reasoning, CLOR is able to formally separate false and normal data, make credibility assessment, and filter out the false ingredient. Simulation results show that improved data credibility can be achieved effectively with our scheme.作者: 造反,叛亂 時間: 2025-3-31 05:09
PTOM: Profit Concerning and Truthful Online Spectrum Double Auction Mechanismbid, we design an efficient admission and pricing rule to improve the auctioneer’s profit. Theoretical analyses are provided to prove that our mechanism has nice economic properties including individual rationality, budget-balance and resistance of time-based and value-based cheating.作者: locus-ceruleus 時間: 2025-3-31 09:48 作者: ANT 時間: 2025-3-31 14:30
Combating TNTL: Non-Technical Loss Fraud Targeting Time-Based Pricing in Smart Grid“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.作者: 大溝 時間: 2025-3-31 21:09