Secure routing for internet of things: A survey (Englisch)
- Neue Suche nach: Airehrour, David
- Neue Suche nach: Airehrour, David
- Neue Suche nach: Gutierrez, Jairo
- Neue Suche nach: Ray, Sayan Kumar
In:
Journal of network and computer applications
;
66
; 198-213
;
2016
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Secure routing for internet of things: A survey
-
Beteiligte:
-
Erschienen in:Journal of network and computer applications ; 66 ; 198-213
-
Verlag:
- Neue Suche nach: Academic Press
-
Erscheinungsort:London [u.a.]
-
Erscheinungsdatum:2016
-
ISSN:
-
ZDBID:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.26 / 54.32
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis – Band 66
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Ensemble based collaborative and distributed intrusion detection systems: A surveyFolino, Gianluigi / Sabatino, Pietro et al. | 2016
- 17
-
Comparative analysis of cloud data integrity auditing protocolsGarg, Neenu / Bawa, Seema et al. | 2016
- 33
-
User context recognition using smartphone sensors and classification modelsOtebolaku, Abayomi Moradeyo / Andrade, Maria Teresa et al. | 2016
- 52
-
HRSPC: a hybrid redundancy scheme via exploring computational locality to support fast recovery and high reliability in distributed storage systemsLi, Shiyi / Cao, Qiang / Wan, Shenggang / Qian, Lu / Xie, Changsheng et al. | 2015
- 64
-
Towards workflow scheduling in cloud computing: A comprehensive analysisMasdari, Mohammad / ValiKardan, Sima / Shahi, Zahra / Azar, Sonay Imani et al. | 2016
- 83
-
Machine-to-Machine (M2M) communications: A surveyVerma, Pawan Kumar / Verma, Rajesh / Prakash, Arun / Agrawal, Ashish / Naik, Kshirasagar / Tripathi, Rajeev / Alsabaan, Maazen / Khalifa, Tarek / Abdelkader, Tamer / Abogharaf, Abdulhakim et al. | 2016
- 106
-
An overview of virtual machine placement schemes in cloud computingMasdari, Mohammad / Nabavi, Sayyid Shahab / Ahmadi, Vafa et al. | 2016
- 128
-
Approaching green sensor field using queue-based optimization techniqueJiang, Fuu-Cheng / You, Ilsun / Leu, Fang-Yi et al. | 2015
- 137
-
Mobile crowdsourcing in peer-to-peer opportunistic networks: Energy usage and response analysisPhuttharak, Jurairat / Loke, Seng W. et al. | 2016
- 151
-
Restoring connectivity in a resource constrained WSNJoshi, Yatish K. / Younis, Mohamed et al. | 2016
- 166
-
A likelihood ratio anomaly detector for identifying within-perimeter computer network attacksGrana, Justin / Wolpert, David / Neil, Joshua / Xie, Dongping / Bhattacharya, Tanmoy / Bent, Russell et al. | 2016
- 180
-
PSUM: Peer-to-peer multimedia content distribution using collusion-resistant fingerprintingQureshi, Amna / Megías, David / Rifà-Pous, Helena et al. | 2016
- 198
-
Secure routing for internet of things: A surveyAirehrour, David / Gutierrez, Jairo / Ray, Sayan Kumar et al. | 2016
- 214
-
Network forensics: Review, taxonomy, and open challengesKhan, Suleman / Gani, Abdullah / Wahab, Ainuddin Wahid Abdul / Shiraz, Muhammad / Ahmad, Iftikhar et al. | 2016
- 236
-
Big data analytic architecture for intruder detection in heterogeneous wireless sensor networksMohapatra, Suvendu Kumar / Sahoo, Prasan Kumar / Wu, Shih-Lin et al. | 2016
- 250
-
Flexible service provisioning based on context constraint for enhancing user experience in service oriented mobile cloudChunlin, Li / Xin, Yan / LaYuan, Li et al. | 2016
- IFC
-
Editorial board| 2016