Posts
VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES
VULNERABILITY ANALYSIS IN SOA-BASED BUSINESS PROCESSES
Robust Correlation of Encrypted Attack Traffic Through...
Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow ...
Jamming-Aware Traffic Allocation for Multiple-Path Rout...
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selec...
Continuous Neighbor Discovery in Asynchronous Sensor Ne...
Continuous Neighbor Discovery in Asynchronous Sensor Networks
The Geometric Efficient Matching Algorithm for Firewalls
The Geometric Efficient Matching Algorithm for Firewalls
Distributed Adaptation of Quantized Feedback for Downl...
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
Adaptive Fault Tolerant QoS Control Algorithms for Maxi...
Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of...
Integration of Sound Signature in Graphical Password Au...
Integration of Sound Signature in Graphical Password Authentication System
Network Coding Based Privacy Preservation against Traff...
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop ...
Live Streaming with Receiver-based Peer-division Multip...
Live Streaming with Receiver-based Peer-division Multiplexing
Privacy-Preserving Multi-keyword Ranked Search over Enc...
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Exploiting Dynamic Resource Allocation for Efficient Pa...
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in...
A personalized ontology model for web information gathe...
A personalized ontology model for web information gathering