Showing 209 - 221 of 226
View by: Cover Page List Articles
-
A Hybrid CPU/GPU Pattern-Matching Algorithm for Deep Packet Inspection
published 05 Oct 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems
published 12 Aug 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’
published 11 Aug 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
Hybrid Epidemics—A Case Study on Computer Worm Conficker
published 15 May 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards
published 15 May 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
published 07 Apr 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
Design and Implementation of Website Information Disclosure Assessment System
published 13 Mar 2015
Loading metrics information...
Metrics unavailable. Please check back later.
-
MM-MDS: A Multidimensional Scaling Database with Similarity Ratings for 240 Object Categories from the Massive Memory Picture Database
published 12 Nov 2014
Loading metrics information...
Metrics unavailable. Please check back later.
-
Ranking Reputation and Quality in Online Rating Systems
published 12 May 2014
Loading metrics information...
Metrics unavailable. Please check back later.
-
Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns
published 27 Nov 2013
Loading metrics information...
Metrics unavailable. Please check back later.
-
Comprehensive Quantitative Analysis on Privacy Leak Behavior
published 16 Sep 2013
Loading metrics information...
Metrics unavailable. Please check back later.
-
Scaling-Laws of Human Broadcast Communication Enable Distinction between Human, Corporate and Robot Twitter Users
published 03 Jul 2013
Loading metrics information...
Metrics unavailable. Please check back later.
-
Applying Pebble-Rotating Game to Enhance the Robustness of DHTs
published 11 Jun 2013
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us