


default search action
Journal of Network and Computer Applications, Volume 84
Volume 84, April 2017
- Neenu Garg, Seema Bawa:

RITS-MHT: Relative indexed and time stamped Merkle hash tree based data auditing protocol for cloud computing. 1-13 - Ingrid Nunes

, Frederico Schardong
, Alberto E. Schaeffer Filho
:
BDI2DoS: An application using collaborating BDI agents to combat DDoS attacks. 14-24 - Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, Sean Carlisto de Alvarenga:

A survey of intrusion detection in Internet of Things. 25-37 - Muhammad Baqer Mollah

, Md. Abul Kalam Azad, Athanasios V. Vasilakos
:
Security and privacy challenges in mobile cloud computing: Survey and way ahead. 38-54 - Gürkan Solmaz, Damla Turgut:

Tracking pedestrians and emergent events in disaster areas. 55-67 - Md. Mahfuzur Rahman

, Peter Graham:
Compatibility-based static VM placement minimizing interference. 68-81 - Babak Pourpeighambar, Mehdi Dehghan

, Masoud Sabaei:
Multi-agent learning based routing for delay minimization in Cognitive Radio Networks. 82-92 - Imad Jawhar, Nader Mohamed, Jameela Al-Jaroodi, Dharma P. Agrawal, Sheng Zhang:

Communication and networking of UAV-based systems: Classification and associated architectures. 93-108 - Mohammed I. Alghamdi

, Xunfei Jiang, Ji Zhang, Jifu Zhang, Minghua Jiang, Xiao Qin
:
Towards two-phase scheduling of real-time applications in distributed systems. 109-117 - Binglei Guo

, Jiong Yu, Bin Liao, Dexian Yang
, Liang Lu
:
A green framework for DBMS based on energy-aware query optimization and energy-efficient query processing. 118-130

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














