Enhancing network lifetime through power-aware routing in MANET
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019554
TAACS-FL: trust aware access control system using fuzzy logic for internet of things
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10016266
Efficient parking control algorithms for self-driving cars
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023434
Performance analysis of cloud computing using series of queues with Erlang service
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019559
Risk-based availability modelling and reputation management on fault tolerant cloud computing systems
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019550
Outlier detection techniques for big data streams: focus on cyber security
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024067
A scalable fine-grained analytic model for container cloud data centres
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024062
Privacy preserving computation of scalar product and sign of scalar product
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10013024
Event detection in sports video based on audio-visual and support vector machine. Case-study: football
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019549
Dynamic Software Management practices using Genetically Augmented Neural Networks
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10016700
An efficient spectrum handoff decision making scheme for cognitive radio networks
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019552
An integrated approach for network traffic analysis using unsupervised clustering and supervised classification
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024065
Deadline-credit aware heuristic for dynamic resource provisioning in virtualised cloud environment
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024063
Storage and query over encrypted sensitive association rules in database
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10012622
Efficient authentication and key management scheme for wireless mesh networks
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019568
A multi-controller placement strategy in software defined networks using affinity propagation
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10015442
A novel dyadic multiresolution wavelet image steganography using N-ary
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019547
Financial default payment predictions using a hybrid of simulated annealing heuristics and extreme gradient boosting machines
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024064
Cost-based constrained task scheduling in cloud environment
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019551
Dynamic high bandwidth nodes for routing in MANETs
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019546
Comparison of security-related methods in Open Interconnect Consortium and one machine-to-machine for security interoperability
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023427
Secure communication process in IoT using media gate network transmit protocol with reliable data transport protocol
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019556
Response time-based resource allocation according to service level agreements in cloud computing
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019526
Agile polymorphic software-defined fog computing platform for mobile wireless controllers and sensors
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024066
A novel data aware task clustering mechanism for scientific workflow applications in cloud
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023426
Improving cloud computing services indexing based on B Cloud -tree with users preferences
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/ijitst.2019.10024068
Spatial data storage and retrieval in cloud computing environments using attribute based encryption algorithm
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10019567
REVIEW OF CYBER ATTACKS CLASSIFICATIONS AND THREATS ANALYSIS IN CYBER-PHYSICAL SYSTEMS
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10015387
A public key-based encryption and signature verification model for secured image transmission in network
来源期刊:International Journal of Internet Technology and Secured TransactionsDOI:10.1504/IJITST.2019.10023424