Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
VANET security surveysEngoulou, Richard Gilles ; Bellaïche, Martine ; Pierre, Samuel ; Quintero, AlejandroComputer communications, 2014-05, Vol.44, p.1-13 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
2 |
Material Type: Artigo
|
A generic statistical approach for spam detection in Online Social NetworksAhmed, Faraz ; Abulaish, MuhammadComputer communications, 2013-06, Vol.36 (10-11), p.1120-1129 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
3 |
Material Type: Artigo
|
A survey of intrusion detection in wireless network applicationsMitchell, Robert ; Chen, Ing-RayComputer communications, 2014-04, Vol.42, p.1-23 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
4 |
Material Type: Artigo
|
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standardsBaronti, Paolo ; Pillai, Prashant ; Chook, Vince W.C. ; Chessa, Stefano ; Gotta, Alberto ; Hu, Y. FunComputer communications, 2007-05, Vol.30 (7), p.1655-1695 [Periódico revisado por pares]Amsterdam: Elsevier B.VTexto completo disponível |
|
5 |
Material Type: Artigo
|
IoT-aided robotics applications: Technological implications, target domains and open issuesGrieco, L.A. ; Rizzo, A. ; Colucci, S. ; Sicari, S. ; Piro, G. ; Di Paola, D. ; Boggia, G.Computer communications, 2014-12, Vol.54, p.32-47 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
6 |
Material Type: Artigo
|
Security in wireless ad-hoc networks – A surveyDi Pietro, R. ; Guarino, S. ; Verde, N.V. ; Domingo-Ferrer, J.Computer communications, 2014-09, Vol.51, p.1-20 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
7 |
Material Type: Artigo
|
Research challenges towards the Future InternetConti, Marco ; Chong, Song ; Fdida, Serge ; Jia, Weijia ; Karl, Holger ; Lin, Ying-Dar ; Mähönen, Petri ; Maier, Martin ; Molva, Refik ; Uhlig, Steve ; Zukerman, MosheComputer communications, 2011-12, Vol.34 (18), p.2115-2134 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
8 |
Material Type: Artigo
|
A more efficient and secure dynamic ID-based remote user authentication schemeWang, Yan-yan ; Liu, Jia-yong ; Xiao, Feng-xia ; Dan, JingComputer communications, 2009-03, Vol.32 (4), p.583-585 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
9 |
Material Type: Artigo
|
False alarm minimization techniques in signature-based intrusion detection systems: A surveyHubballi, Neminath ; Suryanarayanan, VinothComputer communications, 2014-08, Vol.49, p.1-17 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |
|
10 |
Material Type: Artigo
|
Vulnerabilities in cognitive radio networks: A surveyBhattacharjee, Shameek ; Sengupta, Shamik ; Chatterjee, MainakComputer communications, 2013-07, Vol.36 (13), p.1387-1398 [Periódico revisado por pares]Kidlington: Elsevier B.VTexto completo disponível |