default search action
Journal of Network and Computer Applications, Volume 66
Volume 66, May 2016
- Gianluigi Folino, Pietro Sabatino:
Ensemble based collaborative and distributed intrusion detection systems: A survey. 1-16 - Neenu Garg, Seema Bawa:
Comparative analysis of cloud data integrity auditing protocols. 17-32 - Abayomi Moradeyo Otebolaku, Maria Teresa Andrade:
User context recognition using smartphone sensors and classification models. 33-51 - Shiyi Li, Qiang Cao, Shenggang Wan, Lu Qian, Changsheng Xie:
HRSPC: a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systems. 52-63 - Mohammad Masdari, Sima ValiKardan, Zahra Shahi, Sonay Imani Azar:
Towards workflow scheduling in cloud computing: A comprehensive analysis. 64-82 - Pawan Kumar Verma, Rajesh Verma, Arun Prakash, Ashish Agrawal, Kshirasagar Naik, Rajeev Tripathi, Maazen Alsabaan, Tarek Khalifa, Tamer Abdelkader, Abdulhakim Abogharaf:
Machine-to-Machine (M2M) communications: A survey. 83-105 - Mohammad Masdari, Sayyid Shahab Nabavi, Vafa Ahmadi:
An overview of virtual machine placement schemes in cloud computing. 106-127 - Fuu-Cheng Jiang, Ilsun You, Fang-Yie Leu:
Approaching green sensor field using queue-based optimization technique. 128-136 - Jurairat Phuttharak, Seng W. Loke:
Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysis. 137-150 - Yatish K. Joshi, Mohamed F. Younis:
Restoring connectivity in a resource constrained WSN. 151-165 - Justin Grana, David H. Wolpert, Joshua Neil, Dongping Xie, Tanmoy Bhattacharya, Russell Bent:
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks. 166-179 - Amna Qureshi, David Megías, Helena Rifà-Pous:
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprinting. 180-197 - David Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray:
Secure routing for internet of things: A survey. 198-213 - Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, Iftikhar Ahmad:
Network forensics: Review, taxonomy, and open challenges. 214-235 - Suvendu Kumar Mohapatra, Prasan Kumar Sahoo, Shih-Lin Wu:
Big data analytic architecture for intruder detection in heterogeneous wireless sensor networks. 236-249 - Chunlin Li, Yan Xin, Layuan Li:
Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloud. 250-261
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.