Efficient Region-Based Skyline Computation for a Group of Users | 0 | 0.34 | 2022 |
A Continuous Region-Based Skyline Computation for a Group of Mobile Users. | 0 | 0.34 | 2022 |
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data | 0 | 0.34 | 2022 |
A Detailed Description On Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework | 0 | 0.34 | 2019 |
Efficient Skyline Processing Algorithm over Dynamic and Incomplete Database. | 0 | 0.34 | 2018 |
Missing Values Estimation For Skylines In Incomplete Database | 0 | 0.34 | 2018 |
A Framework for Processing Skyline Queries for a Group of Mobile Users. | 0 | 0.34 | 2018 |
Processing skyline queries in incomplete distributed databases. | 2 | 0.39 | 2017 |
State of the Art in Biometric Key Binding and Key Generation Schemes. | 0 | 0.34 | 2017 |
A Secure And Privacy Preserving Iris Biometric Authentication Scheme With Matrix Transformation | 0 | 0.34 | 2016 |
Performance-Aware Trust-Based Access Control for Protecting Sensitive Attributes. | 0 | 0.34 | 2016 |
An Evaluation on KNN-SVM Algorithm for Detection and Prediction of DDoS Attack. | 2 | 0.39 | 2016 |
A Formal Calculus for International Relations Computation and Evaluation. | 0 | 0.34 | 2016 |
A Mathematical Trust Algebra for International Nation Relations Computation and Evaluation. | 0 | 0.34 | 2016 |
A refined filter for UHAD to improve anomaly detection. | 1 | 0.35 | 2016 |
A Hybrid Scheme for Face Template Protection | 0 | 0.34 | 2016 |
A New DNA-Based Approach of Generating Key-dependent ShiftRows Transformation. | 0 | 0.34 | 2015 |
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating. | 0 | 0.34 | 2015 |
Privacy Levels for Computer Forensics: Toward a More Efficient Privacy-preserving Investigation | 3 | 0.40 | 2015 |
An Overview of Media Streams Caching in Peer-to-Peer Systems. | 0 | 0.34 | 2014 |
Intelligent Cooperative Least Recently Used Web Caching Policy Based On J48 Classifier | 0 | 0.34 | 2014 |
Packet Header Anomaly Detection Using Statistical Analysis | 3 | 0.39 | 2014 |
Signature-Based Anomaly intrusion detection using Integrated data mining classifiers | 0 | 0.34 | 2014 |
WINDOWS WEB PROXY CACHING SIMULATION: A TOOL FOR SIMULATING WEB PROXY CACHING UNDER WINDOWS OPERATING SYSTEMS | 1 | 0.36 | 2014 |
XACML Policy Inconsistency Analysis and Resolution. | 0 | 0.34 | 2014 |
INTRUSION DETECTION SYSTEM IN SECURE SHELL TRAFFIC IN CLOUD ENVIRONMENT | 2 | 0.46 | 2014 |
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks | 5 | 0.45 | 2014 |
An Intra-domain Mobility Handling Scheme Across All-IP Wireless Networks | 0 | 0.34 | 2012 |
Generating Pareto-Optimal Offers in Bilateral Automated Negotiation with One-Side Uncertain Importance Weights. | 0 | 0.34 | 2012 |
Analytical studies and experimental examines for flooding-based search algorithms | 3 | 0.39 | 2012 |
A Compact Bit String Accessibility Map for Secure XML Query Processing. | 2 | 0.35 | 2012 |
Finest authorizing member of common criteria certification. | 2 | 0.70 | 2012 |
An alert fusion model inspired by artificial immune system | 1 | 0.35 | 2012 |
Towards secure model for SCADA systems. | 4 | 0.48 | 2012 |
STITCH-256: A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION. | 0 | 0.34 | 2012 |
Shortcoming, problems and analytical comparison for flooding-based search techniques in unstructured P2P networks. | 15 | 0.61 | 2012 |
Energy-efficient intrusion detection in Wireless Sensor Network | 0 | 0.34 | 2012 |
Active warden as the main hindrance for steganography information retrieval. | 2 | 0.40 | 2012 |
An encoding scheme based on fractional number for querying and updating XML data | 10 | 0.50 | 2012 |
A Performance Evaluation of Preference Evaluation Techniques in Real High Dimensional Database. | 0 | 0.34 | 2012 |
Label Size Increment of Bit String Based Labeling Scheme in Dynamic XML Updating. | 2 | 0.36 | 2011 |
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment. | 0 | 0.34 | 2011 |
Evaluating user-centered privacy model (UPM) in pervasive computing systems | 0 | 0.34 | 2011 |
File Integrity Monitor Scheduling Based on File Security Level Classification. | 2 | 0.38 | 2011 |
Investigation of bypassing malware defences and malware detections. | 8 | 0.66 | 2011 |
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating. | 3 | 0.37 | 2011 |
Adaptable Decentralized Service Oriented Architecture | 10 | 0.66 | 2011 |
A Systematic Review of File Sharing in Mobile Devices Using Peer-To-Peer Systems | 1 | 0.35 | 2011 |
A Framework for Checking and Ranking Integrity Constraints in a Distributed Database. | 0 | 0.34 | 2011 |
Performance Evaluation of Preference Evaluation Techniques. | 0 | 0.34 | 2011 |