找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P

[復制鏈接]
樓主: exterminate
41#
發(fā)表于 2025-3-28 17:58:25 | 只看該作者
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
42#
發(fā)表于 2025-3-28 19:44:57 | 只看該作者
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr
43#
發(fā)表于 2025-3-29 02:47:23 | 只看該作者
44#
發(fā)表于 2025-3-29 03:08:56 | 只看該作者
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..
45#
發(fā)表于 2025-3-29 07:30:00 | 只看該作者
46#
發(fā)表于 2025-3-29 14:30:35 | 只看該作者
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.
47#
發(fā)表于 2025-3-29 16:33:07 | 只看該作者
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
48#
發(fā)表于 2025-3-29 20:14:20 | 只看該作者
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
49#
發(fā)表于 2025-3-30 02:27:14 | 只看該作者
50#
發(fā)表于 2025-3-30 07:17:24 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-6 12:45
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
舒城县| 乌兰县| 文山县| 容城县| 利津县| 宜昌市| 钟山县| 当阳市| 冕宁县| 岳阳市| 娱乐| 元谋县| 阆中市| 平顶山市| 禹城市| 阜阳市| 靖远县| 钟山县| 永平县| 化德县| 彭泽县| 石棉县| 葵青区| 南城县| 盐源县| 陵水| 临江市| 和平区| 清流县| 雷山县| 应用必备| 桃江县| 汉川市| 内黄县| 四会市| 永靖县| 青浦区| 沂源县| 开原市| 将乐县| 南投市|