Cross-Platform Immersive Visualization and Navigation with Augmented Reality. | 0 | 0.34 | 2021 |
Encryption-free data transmission and hand-over in two-tier body area networks. | 0 | 0.34 | 2020 |
Proof of Network Security Services - Enforcement of Security SLA through Outsourced Network Testing. | 0 | 0.34 | 2020 |
Proof of outsourced encryption: cross verification of security service level agreement. | 0 | 0.34 | 2020 |
Equipment Contention Attack in Cloud Manufacturing Environments and Its Defense | 0 | 0.34 | 2019 |
Middle School Students' Social Media Use. | 0 | 0.34 | 2018 |
Lightweight Detection of On-Body Sensor Impersonator in Body Area Networks | 0 | 0.34 | 2016 |
Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware. | 0 | 0.34 | 2016 |
Optimizing content delivery in ICN networks by the supply chain model | 1 | 0.36 | 2016 |
Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines | 0 | 0.34 | 2015 |
An investigation of collaborations between top Chinese universities: a new quantitative approach | 1 | 0.35 | 2014 |
Rootkit detection on virtual machines through deep information extraction at hypervisor-level | 5 | 0.41 | 2013 |
An Action-Stack Based Selective-Undo Method in Feature Model Customization. | 0 | 0.34 | 2013 |
Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing | 1 | 0.35 | 2013 |
Alternating-directional Doubling Algorithm for M-Matrix Algebraic Riccati Equations. | 13 | 0.74 | 2012 |
Towards the attacker's view of protocol narrations (or, how to compile security protocols) | 0 | 0.34 | 2012 |
Fingerprinting large data sets through memory de-duplication technique in virtual machines | 1 | 0.35 | 2011 |
Non-Normalizable Functions: A New Method To Generate Metamorphic Malware | 0 | 0.34 | 2011 |
Evolutionary computation methods for helicopter loads estimation. | 0 | 0.34 | 2011 |
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines | 21 | 1.24 | 2011 |
Rethinking about guessing attacks | 0 | 0.34 | 2011 |
Rethinking about Type-Flaw Attacks | 3 | 0.37 | 2010 |
Interactive detection of network anomalies via coordinated multiple views. | 6 | 0.48 | 2010 |
Deciding recognizability under Dolev-Yao intruder model | 2 | 0.36 | 2010 |
Node Localization in Wireless Networks through Physical Layer Network Coding | 3 | 0.40 | 2010 |
Detecting Sybil nodes in wireless networks with physical layer network coding | 6 | 0.50 | 2010 |
A surface topology and motion compensation system for microsurgery guidance and intervention based on common-path optical coherence tomography. | 4 | 0.63 | 2009 |
Secure and efficient access to outsourced data | 89 | 4.03 | 2009 |
Visualisation of wormholes in underwater sensor networks: a distributed approach | 27 | 1.19 | 2008 |
Secure Group-Based Information Sharing in Mobile Ad Hoc Networks | 5 | 0.51 | 2008 |
Interactive wormhole detection and evaluation | 10 | 0.54 | 2007 |
Interactive Wormhole Detection in Large Scale Wireless Networks | 7 | 0.56 | 2006 |
Visualization assisted detection of sybil attacks in wireless networks | 5 | 0.45 | 2006 |
Trust-based privacy preservation for peer-to-peer data sharing | 21 | 0.96 | 2006 |
Defending against wormhole attacks in mobile ad hoc networks | 39 | 1.38 | 2006 |
Wireless networking security: open issues in trust, management, interoperation and measurement | 14 | 0.59 | 2006 |
Construction of Tele-Rehabilitation Platform Using Distributed Common Object Models | 1 | 0.37 | 2006 |
Cooperative co-evolutionary approach applied in reactive power optimization of power system | 0 | 0.34 | 2006 |
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks | 16 | 1.07 | 2005 |
Key distribution and update for secure inter-group multicast communication | 11 | 0.88 | 2005 |
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA) | 45 | 2.00 | 2004 |
Visualization of wormholes in sensor networks | 105 | 4.90 | 2004 |
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks | 8 | 0.88 | 2003 |
Study of distance vector routing protocols for mobile ad hoc networks | 30 | 1.95 | 2003 |