找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cloud Computing and Security; Second International Xingming Sun,Alex Liu,Elisa Bertino Conference proceedings 2016 Springer International P

[復制鏈接]
樓主: exterminate
41#
發(fā)表于 2025-3-28 17:58:25 | 只看該作者
An Energy-Efficient Data Gathering Based on Compressive SensingTo energy-efficient communication, Compressive Sensing (CS) has been employed gradually. This paper proposes a data gathering scheme based on CS. The network is divided into several blocks and each block sends data to the sink for reconstruction. Experiments demonstrate that our algorithm is feasible and outperforms other schemes.
42#
發(fā)表于 2025-3-28 19:44:57 | 只看該作者
https://doi.org/10.1007/978-3-319-48674-1authentication; cloud computing; mobile and wireless security; security protocols; theory of database pr
43#
發(fā)表于 2025-3-29 02:47:23 | 只看該作者
44#
發(fā)表于 2025-3-29 03:08:56 | 只看該作者
Conference proceedings 2016om 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics..
45#
發(fā)表于 2025-3-29 07:30:00 | 只看該作者
46#
發(fā)表于 2025-3-29 14:30:35 | 只看該作者
,Der h?morrhagisch-traumatische Schock, And then the holes determination problem is converted into the optimization problem, so we employ the Fuzzy C-Mean method to identify the network holes. Finally, network repair method is proposed to maintenance the network. Simulation results show that the proposed method could effectively improve the lifetime of network and sensing quality.
47#
發(fā)表于 2025-3-29 16:33:07 | 只看該作者
Zur Pathophysiologie des Schocks,“steal” time. Thus, existing schemes cannot detect them. In this paper, we summarize four attack models of TNTL frauds and analyze various attacks in Smart Grid. We eliminate attacks that do not relate to TNTL frauds and propose countermeasures for those related attacks to prevent TNTL frauds.
48#
發(fā)表于 2025-3-29 20:14:20 | 只看該作者
https://doi.org/10.1007/978-3-030-85784-4ues in AMI and figure out which issues could be utilized by NTL fraud. We analyze various attacks in AMI and generalize attack tree of NTL fraud. We propose countermeasures for security issues to prevent NTL frauds.
49#
發(fā)表于 2025-3-30 02:27:14 | 只看該作者
50#
發(fā)表于 2025-3-30 07:17:24 | 只看該作者
 關于派博傳思  派博傳思旗下網站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網 吾愛論文網 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經驗總結 SCIENCEGARD IMPACTFACTOR 派博系數 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網安備110108008328) GMT+8, 2025-10-6 12:45
Copyright © 2001-2015 派博傳思   京公網安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
黄石市| 那坡县| 万载县| 临泉县| 阳城县| 芦溪县| 开化县| 塘沽区| 武宁县| 梅河口市| 左权县| 新竹市| 大方县| 黔西| 卢氏县| 东港市| 保定市| 上高县| 新郑市| 吴桥县| 北海市| 万山特区| 深水埗区| 禹州市| 景泰县| 固始县| 宜兰县| 九龙城区| 城市| 油尖旺区| 同心县| 萍乡市| 许昌县| 和龙市| 曲靖市| 闵行区| 襄垣县| 永吉县| 舞阳县| 南投县| 樟树市|