共 151 条
[33]
Chandra S, 2017, IEEE INT ADV COMPUT, P89, DOI [10.1109/IACC.2017.0033, 10.1109/IACC.2017.25]
[34]
Chaudhari N, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P60, DOI 10.1109/CCAA.2016.7813690
[35]
Chen F, 2018, PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), P68, DOI 10.1109/IDAACS-SWS.2018.8525522
[36]
Choi SH, 2018, INT CONF UBIQ FUTUR, P305, DOI 10.1109/ICUFN.2018.8436590
[37]
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
[J].
IEEE ACCESS,
2018, 6
:30049-30059
[38]
A Reference Architecture for Supporting Secure Big Data Analytics over Cloud-Enabled Relational Databases
[J].
PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2,
2016,
:356-358
[39]
Neural network approach of attack's detection in the network traffic
[J].
2007 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS,
2007,
:128-129
[40]
Deshmukh DH, 2014, 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS)