Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Искусственный интеллект - 004.8
Научные статьи
В разделе "Искусственный интеллект"
Distributed Monitoring for Wireless Sensor Networks: a Multi-Agent Approach
Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network
HTTP Packet Inspection Policy for Improvising Internal Network Security
Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2
Performance Evaluation of Power Aware VM Consolidation using Live Migration
Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count
Information Hiding Using Least Significant Bit Steganography and Cryptography
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
Analysis of Base Station Assisted Novel Network Design Space for Edge-based WSNs
Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing
Enhanced Voting based Secure Localization for Wireless Sensor Networks
An Intrusion Detection and Prevention System based on Automatic Learning of Traffic Anomalies
Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform
Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings
An Improved Hybrid Mechanism for Secure Data Communication
Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
A Novel Scheme for Image Authentication and Secret Data Sharing
Alternative Equations for Guillou-Quisquater Signature Scheme
Using String Kernel for Document Clustering
Impact of Variation in Pause Time and Network Load in AODV and AOMDV Protocols
Database Semantic Interoperability based on Information Flow Theory and Formal Concept Analysis
Offline Handwritten Devanagari Script Recognition
Design of an Android Application for Secure Chatting
A Text Analysis Based Seamless Framework for Predicting Human Personality Traits from Social Networking Sites
Prediction of Missing Values for Decision Attribute
Symmetric Key Encryption using Iterated Fractal Functions
A Novel and Efficient Method for Protecting Internet Usage from Unauthorized Access Using Map Reduce
Application of Cosmos's law of Merge and Split for Data Encryption
Malware-Free Intrusions: Exploitation of Built-in Pre-Authentication Services for APT Attack Vectors
Trust Establishment in SDN: Controller and Applications
On Classical Cryptographic Protocols in Post-Quantum World
CVSHR: Enchantment Cloud-based Video Streaming using the Heterogeneous Resource Allocation
Towards Modeling Malicious Agents in Decentralized Wireless Sensor Networks: A Case of Vertical Worm Transmissions and Containment
An Efficient Graph-Coloring Algorithm for Processor Allocation
Systematic Review and Classification on Video Surveillance Systems
On Approximate Equivalences of Multigranular Rough Sets and Approximate Reasoning
A Cluster Based Job Scheduling Algorithm for Grid Computing
Extraction and Analysis of Mural Diseases Information Based on Digital Orthophoto Map
Opinion Analysis Using Domain Ontology for Implementing Natural Language Based Feedback System
Service Based Cooperation Patterns to Support Flexible Inter-Organizational Workflows
← Предыдущая
Следующая страница →
1
|
...
|
6
|
7
|
8
|
9
|
10
|
11
|
12
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.