找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P

[復(fù)制鏈接]
樓主: exterminate
41#
發(fā)表于 2025-3-28 17:58:25 | 只看該作者
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
42#
發(fā)表于 2025-3-28 19:44:57 | 只看該作者
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr
43#
發(fā)表于 2025-3-29 02:47:23 | 只看該作者
44#
發(fā)表于 2025-3-29 03:08:56 | 只看該作者
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..
45#
發(fā)表于 2025-3-29 07:30:00 | 只看該作者
46#
發(fā)表于 2025-3-29 14:30:35 | 只看該作者
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.
47#
發(fā)表于 2025-3-29 16:33:07 | 只看該作者
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
48#
發(fā)表于 2025-3-29 20:14:20 | 只看該作者
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
49#
發(fā)表于 2025-3-30 02:27:14 | 只看該作者
50#
發(fā)表于 2025-3-30 07:17:24 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 01:58
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
板桥市| 海原县| 武穴市| 海盐县| 屏东市| 赤水市| 成都市| 阳谷县| 和林格尔县| 鄯善县| 青冈县| 白沙| 青川县| 通山县| 三原县| 张家界市| 望奎县| 韶山市| 锡林浩特市| 丹东市| 绵阳市| 土默特左旗| 利川市| 邢台市| 托克逊县| 伊川县| 旬阳县| 邯郸市| 平潭县| 罗定市| 论坛| 休宁县| 贵定县| 曲阳县| 沅江市| 古丈县| 普宁市| 甘孜县| 嘉峪关市| 临漳县| 伽师县|