找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P

[復制鏈接]
樓主: exterminate
41#
發(fā)表于 2025-3-28 17:58:25 | 只看該作者
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
42#
發(fā)表于 2025-3-28 19:44:57 | 只看該作者
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr
43#
發(fā)表于 2025-3-29 02:47:23 | 只看該作者
44#
發(fā)表于 2025-3-29 03:08:56 | 只看該作者
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..
45#
發(fā)表于 2025-3-29 07:30:00 | 只看該作者
46#
發(fā)表于 2025-3-29 14:30:35 | 只看該作者
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.
47#
發(fā)表于 2025-3-29 16:33:07 | 只看該作者
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
48#
發(fā)表于 2025-3-29 20:14:20 | 只看該作者
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
49#
發(fā)表于 2025-3-30 02:27:14 | 只看該作者
50#
發(fā)表于 2025-3-30 07:17:24 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-6 12:45
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
惠安县| 永顺县| 米泉市| 镇原县| 南部县| 九江市| 巴塘县| 朝阳市| 黄山市| 湘阴县| 石狮市| 凌源市| 临汾市| 玉田县| 军事| 新源县| 红河县| 景德镇市| 连江县| 法库县| 承德县| 巴东县| 元朗区| 宜阳县| 称多县| 界首市| 荥经县| 手游| 大名县| 乐安县| 桑日县| 临安市| 望谟县| 河北省| 浏阳市| 岳阳市| 德昌县| 玉屏| 通河县| 磴口县| 藁城市|