找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P

[復制鏈接]
樓主: exterminate
41#
發(fā)表于 2025-3-28 17:58:25 | 只看該作者
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
42#
發(fā)表于 2025-3-28 19:44:57 | 只看該作者
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr
43#
發(fā)表于 2025-3-29 02:47:23 | 只看該作者
44#
發(fā)表于 2025-3-29 03:08:56 | 只看該作者
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..
45#
發(fā)表于 2025-3-29 07:30:00 | 只看該作者
46#
發(fā)表于 2025-3-29 14:30:35 | 只看該作者
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.
47#
發(fā)表于 2025-3-29 16:33:07 | 只看該作者
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
48#
發(fā)表于 2025-3-29 20:14:20 | 只看該作者
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
49#
發(fā)表于 2025-3-30 02:27:14 | 只看該作者
50#
發(fā)表于 2025-3-30 07:17:24 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-6 12:45
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
平安县| 阿克| 柘城县| 金乡县| 阳原县| 花莲市| 宜黄县| 靖江市| 凤台县| 新泰市| 阿鲁科尔沁旗| 临清市| 奉新县| 会昌县| 合水县| 故城县| 东光县| 定边县| 桃园市| 同仁县| 彰武县| 马公市| 松溪县| 赤峰市| 南开区| 平乐县| 塘沽区| 隆昌县| 瓦房店市| 彰化市| 长兴县| 临潭县| 罗定市| 营口市| 蒙阴县| 林周县| 睢宁县| 兴义市| 清流县| 莲花县| 灵宝市|