default search action
International Journal of Autonomous and Adaptive Communications Systems, Volume 10
Volume 10, Number 1, 2017
- Meng Liu, Wanchun Dou, Shui Yu:
How to shutdown a cloud: a DDoS attack in a private infrastructure-as-a-service cloud. 1-14 - Clinton Carpene, Michael N. Johnstone, Andrew Woodward:
The effectiveness of classification algorithms on IPv6 IID construction. 15-22 - Jiaqi Liu, Guojun Wang, Zhigang Chen, Hui Liu:
A cooperation guarantee mechanism based on altruistic punishment for nodes in distributed environments. 23-37 - Jieren Cheng, Xiangyan Tang, Jianping Yin:
A change-point DDoS attack detection method based on half interaction anomaly degree. 38-54 - Huawei Zhao, Minglei Shu, Jing Qin, Jiankun Hu:
Key negotiation schemes for body sensor networks on the surface of the human body. 55-66 - Mary A. Geetha, D. P. Acharjya, N. Ch. Sriman Narayana Iyengar:
Privacy preservation in fuzzy association rules using rough set on intuitionistic fuzzy approximation spaces and DSR. 67-87 - Hisain Elshaafi, Jimmy McGibney, Dmitri Botvich:
Attack surface-based security metric framework for service selection and composition. 88-113 - Haroun Benkaouha, Nadjib Badache, Abdelli Abdelkrim, Lynda Mokdad, Jalel Ben-Othman:
A novel hybrid protocol of checkpointing and rollback recovery for flat MANETs. 114-138
Volume 10, Number 2, 2017
- Xianzhong Xie, Helin Yang, Xiaofeng Hu, Bin Ma:
Cross-layer design of distributed routing and dynamic spectrum access in cognitive radio ad hoc networks. 139-155 - Liping Gao, Yuben Zhang, Lili Gao, Qingkui Chen:
A multi-version document storage strategy based on chord in large-scale real time collaborative environments. 156-173 - Zhonghai Wang, Xiaoya Xu, Keliang Zhou, Hu Cai:
Mobile crowd sensing: an emerging paradigm for internet of things. 174-191 - Manu S. Hegde, Sanjay Singh:
Safe buzz: adaptive security for multi-agents through situational awareness. 192-212 - M. Shamim Kaiser, Kazi M. Ahmed:
Neuro-fuzzy selection algorithm for optimal relaying in OFDM systems. 213-235 - Zhaogang Shu, Xiangmin Ji, Yaohua Lin:
A hybrid security model for virtual machines in cloud environment. 236-246
Volume 10, Number 3, 2017
- Sanjiban Sekhar Roy, V. Madhu Viswanatham, P. Venkata Krishna:
An ensemble design approach based on bagging technique for filtering e-mail spam. 247-260 - Dhanaraj Cheelu, M. Rajasekhara Babu, P. Venkata Krishna, X. Z. Gao:
User preferences and expert opinions based vertical handoff decision strategy with the inclusion of cost parameter for 4G networks. 261-278 - Zehui Shao, Fei Deng, Meilian Liang, Xiaodong Xu, Mingjun Zou:
New optimal modular Sidon sets. 279-289 - Fei Ai, Ping Zhang, Guanglong Du:
A task and role-based access control model in a computer-supported cooperative design system. 290-302 - Fulong Chen, Yunxiang Sun:
FPGA-based elastic in-circuit debugging for complex digital logic design. 303-319 - Nesrine Khabou, Ismael Bouassida Rodriguez, Mohamed Jmaiel:
A context change detection approach for ubiquitous environments. 320-340
Volume 10, Number 4, 2017
- Ines Khoufi, Pascale Minet, Anis Laouiti, Saoucene Mahfoudh:
Survey of deployment algorithms in wireless sensor networks: coverage and connectivity issues and challenges. 341-390 - Keliang Zhou, Taigang Liu, Ling Liang:
Security in cyber-physical systems: challenges and solutions. 391-408 - Chen Xin, Li Di:
A survey on real-time Ethernet. 409-425 - Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou:
Privacy preserving search over multiple servers. 426-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.