You are on page 1of 6

Network security

Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree
4-Way Handshaking
Autonomic Intelligent Cyber-Sensor to Support Industrial Control Network Awareness
Joint physical-application layer security for wireless multimedia delivery
Exploiting multimedia services in mobile social networks from security and privacy
perspectives
Security protection between users and the mobile media cloud
A Probabilistic Generative Model for Mining Cybercriminal Networks from Online
Social Media
A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc
Networks
Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids
An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless
Sensor Networks for IoT Applications
Dependable Fiber-Wireless (FiWi) Access Networks and Their Role in a Sustainable
Third Industrial Revolution Economy
Finding Focus in the Blur of Moving-Target Techniques
On False Data-Injection Attacks against Power System State Estimation: Modeling and
Countermeasures


Networking
Optimization Decomposition for Scheduling and System Configuration in Wireless
Networks
BASA: building mobile Ad-Hoc social networks on top of android
A Survey of Networking Challenges and Routing Protocols in Smart Grids
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
LBDP: Localized Boundary Detection and Parametrization for 3-D Sensor Networks
Keyflow: a prototype for evolving SDN toward core network fabrics
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected
MANETs
A Probabilistic Generative Model for Mining Cybercriminal Networks from Online
Social Media
On the Delay Performance of In-Network Aggregation in Lossy Wireless Sensor
Networks
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-
Based Approach
Information Networks With In-Block Memory




Cloud Computing
Developing Vehicular Data Cloud Services in the IoT Environment
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud
Computing
NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
An Advanced MapReduce: Cloud MapReduce, Enhancements and Applications
Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback
Schemes
TransCom: A Virtual Disk-Based Cloud Computing Platform for Heterogeneous Services
Towards Scalable Traffic Management in Cloud Data Centers
Designing an Energy-Efficient Cloud Messaging Service for Smartphones
A Neural Network Retrieval Technique for High-Resolution Profiling of Cloudy
Atmospheres
Authenticating Location-Based Skyline Queries in Arbitrary Subspaces







Network Security:
Ontology based approach for perception of network security state
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree
4-Way Handshaking
Network Anomaly Detection: Methods, Systems and Tools
Cyber-Physical System Security with Deceptive Virtual Hosts for Industrial Control
Networks
Secure network coding based on lattice signature
Exploiting multimedia services in mobile social networks from security and privacy
perspectives
Security protection between users and the mobile media cloud
On Swarm Intelligence Inspired Self-Organized Networking: Its Bionic Mechanisms,
Designing Principles and Optimization Approaches
Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network
Intrusion Detection






Data Mining:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases
Decision Trees for Mining Data Streams Based on the Gaussian Approximation
Uncertain One-Class Learning and Concept Summarization Learning on Uncertain Data
Streams
A New Multiobjective Evolutionary Algorithm for Mining a Reduced Set of Interesting
Positive and Negative Quantitative Association Rules
Chaos Theory-Based Data-Mining Technique for Image Endmember Extraction:
Laypunov Index and Correlation Dimension (L and D)
A Probabilistic Generative Model for Mining Cybercriminal Networks from Online
Social Media
An Integrated System for Regional Environmental Monitoring and Management Based
on Internet of Things
Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs

You might also like