-
1
-
-
84872967475
-
Mobile cloud computing: state of the art and outlook
-
Dihal S, Bouwman H, Reuver MD, Warnier M, Carlsson C. Mobile cloud computing: state of the art and outlook. Info, Emerald Group Publishing Limited 15 2013; (1): 4–16.
-
(2013)
Info, Emerald Group Publishing Limited
, vol.15
, Issue.1
, pp. 4-16
-
-
Dihal, S.1
Bouwman, H.2
Reuver, M.D.3
Warnier, M.4
Carlsson, C.5
-
2
-
-
84870570913
-
Toward the trend of cloud computing
-
Wang W, Yu C, Rashid A, Chuang H. Toward the trend of cloud computing. Journal of Electronic Commerce Research 2011; 12(4): 238–242.
-
(2011)
Journal of Electronic Commerce Research
, vol.12
, Issue.4
, pp. 238-242
-
-
Wang, W.1
Yu, C.2
Rashid, A.3
Chuang, H.4
-
3
-
-
84954337494
-
Exploring the convergence of mobile computing with cloud computing
-
Ahujia SP, Rolli AC. Exploring the convergence of mobile computing with cloud computing. Network and Communication Technologies 2012; 1(1): 97–102.
-
(2012)
Network and Communication Technologies
, vol.1
, Issue.1
, pp. 97-102
-
-
Ahujia, S.P.1
Rolli, A.C.2
-
4
-
-
77951039985
-
Cloud computing for mobile users: can offloading computation save energy?
-
Kumar K, Lu Y. Cloud computing for mobile users: can offloading computation save energy?Computer 2010; 43(4): 51–56.
-
(2010)
Computer
, vol.43
, Issue.4
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.2
-
5
-
-
84881318165
-
A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing
-
Shiraz M, Gani A, Khokhar RH, Buyya R. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials 2013; 15(3): 1294–1313.
-
(2013)
IEEE Communications Surveys & Tutorials
, vol.15
, Issue.3
, pp. 1294-1313
-
-
Shiraz, M.1
Gani, A.2
Khokhar, R.H.3
Buyya, R.4
-
7
-
-
80051935076
-
Remote display solutions for mobile cloud computing
-
Simoens P, Turck FD, Dhoedt B, Demeester P. Remote display solutions for mobile cloud computing. IEEE Internet Computing 2011; 13(5): 46–53.
-
(2011)
IEEE Internet Computing
, vol.13
, Issue.5
, pp. 46-53
-
-
Simoens, P.1
Turck, F.D.2
Dhoedt, B.3
Demeester, P.4
-
8
-
-
84860849234
-
Balance of security strength and energy for a PMU monitoring system in smart grid
-
Qiu M, Su H, Chen M, Ming Z, Yang LT. Balance of security strength and energy for a PMU monitoring system in smart grid. IEEE Communications Magazine 50 2012; (5): 142–149.
-
(2012)
IEEE Communications Magazine
, vol.50
, Issue.5
, pp. 142-149
-
-
Qiu, M.1
Su, H.2
Chen, M.3
Ming, Z.4
Yang, L.T.5
-
9
-
-
82155167643
-
Energy efficient security algorithm for power grid wide area monitoring system
-
Qiu M, Gao W, Chen M, Niu J, Zhang L. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2011; 2(4): 715–723.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 715-723
-
-
Qiu, M.1
Gao, W.2
Chen, M.3
Niu, J.4
Zhang, L.5
-
10
-
-
84875212881
-
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
-
Qiu M, Zhang L, Ming Z, Chen Z, Qin X, Yang LT. Security-aware optimization for ubiquitous computing systems with SEAT graph approach. Journal of Computer and System Sciences 2013; 79(5): 518–529.
-
(2013)
Journal of Computer and System Sciences
, vol.79
, Issue.5
, pp. 518-529
-
-
Qiu, M.1
Zhang, L.2
Ming, Z.3
Chen, Z.4
Qin, X.5
Yang, L.T.6
-
18
-
-
84892905418
-
Puremeap - a mobile enterprise application platform: a bird's-eye view of the software architecture
-
Indianapolis, Indiana, USA
-
Rubin Y, Guy N, Shachor G, Kallner S, Ben-Harrush I. Puremeap - a mobile enterprise application platform: a bird's-eye view of the software architecture. Proceedings of the 2013 ACM Workshop on Mobile Development Lifecycle, Indianapolis, Indiana, USA; 17–18, 2013.
-
(2013)
Proceedings of the 2013 ACM Workshop on Mobile Development Lifecycle
, pp. 17-18
-
-
Rubin, Y.1
Guy, N.2
Shachor, G.3
Kallner, S.4
Ben-Harrush, I.5
-
19
-
-
84906812325
-
Scalable cloudlet-based mobile computing model
-
Niagara Falls, Ontario, Canada
-
Jararweh Y, Tawalbeh L, Ababneh F, Khreishah A, Dosari F. Scalable cloudlet-based mobile computing model. Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14)/The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14)/Affiliated Workshops, Niagara Falls, Ontario, Canada; 434–441, 2014.
-
(2014)
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14)/The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14)/Affiliated Workshops
, pp. 434-441
-
-
Jararweh, Y.1
Tawalbeh, L.2
Ababneh, F.3
Khreishah, A.4
Dosari, F.5
-
22
-
-
10444255768
-
-
W3C,, [Accessed on December 2014]
-
Chinnici R, Moreau JJ, Ryman A, Weerawarana S. Web services description language (WSDL) version 2.0 part 1: core language. W3C, 2007. http://www.w3.org/TR/2006/CR-wsdl20-20060327/wsdl20-z.pdf [Accessed on December 2014].
-
(2007)
Web services description language (WSDL) version 2.0 part 1: core language
-
-
Chinnici, R.1
Moreau, J.J.2
Ryman, A.3
Weerawarana, S.4
-
24
-
-
84896464174
-
High-performance mobile internet
-
Mahanti A, Sen S. High-performance mobile internet. IEEE Internet Computing 2014; 18(1): 8–11.
-
(2014)
IEEE Internet Computing
, vol.18
, Issue.1
, pp. 8-11
-
-
Mahanti, A.1
Sen, S.2
-
25
-
-
84863337547
-
et al. A review on cloud computing: design challenges in architecture and security
-
Hu F, Qiu M, Li J, Grant T, Taylor D, McCaleb S. et al. A review on cloud computing: design challenges in architecture and security. Journal of Computing and Information Technology 2011; 19(1): 25–55.
-
(2011)
Journal of Computing and Information Technology
, vol.19
, Issue.1
, pp. 25-55
-
-
Hu, F.1
Qiu, M.2
Li, J.3
Grant, T.4
Taylor, D.5
McCaleb, S.6
-
27
-
-
84861610314
-
P2P-MapReduce: parallel data processing in dynamic cloud environments
-
Marozzo F, Talia D, Trunfio P. P2P-MapReduce: parallel data processing in dynamic cloud environments. Journal of Computer and System Sciences 2012; 78(5): 1382–1402.
-
(2012)
Journal of Computer and System Sciences
, vol.78
, Issue.5
, pp. 1382-1402
-
-
Marozzo, F.1
Talia, D.2
Trunfio, P.3
-
29
-
-
84860750873
-
Key technologies of distributed storage for cloud computing
-
Wang Y, Sun W, Zhou S, Pei X, Li X. Key technologies of distributed storage for cloud computing. Journal of Software 2012; 23(4): 232–242.
-
(2012)
Journal of Software
, vol.23
, Issue.4
, pp. 232-242
-
-
Wang, Y.1
Sun, W.2
Zhou, S.3
Pei, X.4
Li, X.5
-
30
-
-
84879569469
-
Research on key technologies of cloud computing
-
In, Elsevier, Beijing, China
-
Zhang S, Yan H, Chen X, Research on key technologies of cloud computing. In Physics Procedia. Elsevier: Beijing, China, 2012; 1791–1797.
-
(2012)
Physics Procedia
, pp. 1791-1797
-
-
Zhang, S.1
Yan, H.2
Chen, X.3
-
32
-
-
84928130094
-
DVM: a big virtual machine for cloud computing
-
Ma Z, Sheng Z, Gu L. DVM: a big virtual machine for cloud computing. IEEE Transactions on Computers 2013; 63(9): 2245–2258.
-
(2013)
IEEE Transactions on Computers
, vol.63
, Issue.9
, pp. 2245-2258
-
-
Ma, Z.1
Sheng, Z.2
Gu, L.3
-
33
-
-
77957712339
-
Network I/O virtualization for cloud computing
-
Luo Y. Network I/O virtualization for cloud computing. IT Professional Magazine 2010; 12(5): 36–41.
-
(2010)
IT Professional Magazine
, vol.12
, Issue.5
, pp. 36-41
-
-
Luo, Y.1
-
34
-
-
84992745549
-
Reverse host allocation approach for virtual machine cloud computing environment
-
Chaudhary D, Chhillar RS. Reverse host allocation approach for virtual machine cloud computing environment. International Journal of Computer Applications 2013; 72(17): 45–49.
-
(2013)
International Journal of Computer Applications
, vol.72
, Issue.17
, pp. 45-49
-
-
Chaudhary, D.1
Chhillar, R.S.2
-
35
-
-
84855579770
-
Virtual machine performance benchmarking
-
Langer SG, French T. Virtual machine performance benchmarking. Journal of Digital Imaging 2011; 24(5): 883–889.
-
(2011)
Journal of Digital Imaging
, vol.24
, Issue.5
, pp. 883-889
-
-
Langer, S.G.1
French, T.2
-
36
-
-
84992738854
-
Energy efficient virtual machine monitoring architecture for green cloud computing
-
Bright PP, Bijolin EE. Energy efficient virtual machine monitoring architecture for green cloud computing. International Journal of Computer Applications 2013; 65(3): 15–18.
-
(2013)
International Journal of Computer Applications
, vol.65
, Issue.3
, pp. 15-18
-
-
Bright, P.P.1
Bijolin, E.E.2
-
37
-
-
84881021877
-
Performance tradeoffs of energy-aware virtual machine consolidation
-
Lovsz G, Niedermeier F, Meer HD. Performance tradeoffs of energy-aware virtual machine consolidation. Cluster Computing 2013; 16(3): 481–496.
-
(2013)
Cluster Computing
, vol.16
, Issue.3
, pp. 481-496
-
-
Lovsz, G.1
Niedermeier, F.2
Meer, H.D.3
-
38
-
-
84885310053
-
Security-preserving live migration of virtual machine in the cloud
-
Zhang F, Chen H. Security-preserving live migration of virtual machine in the cloud. Journal of Network and Systems Management 2013; 21:562–587.
-
(2013)
Journal of Network and Systems Management
, vol.21
, pp. 562-587
-
-
Zhang, F.1
Chen, H.2
-
39
-
-
84905235129
-
Sensor virtualization for underwater event detection
-
Wang Z, Liu M, Zhang S, Qiu M. Sensor virtualization for underwater event detection. Journal of Systems Architecture 2014; 60(8): 619–629.
-
(2014)
Journal of Systems Architecture
, vol.60
, Issue.8
, pp. 619-629
-
-
Wang, Z.1
Liu, M.2
Zhang, S.3
Qiu, M.4
-
42
-
-
84910605802
-
Workload modeling for virtual machine-hosted application
-
Zhang W, Liu J, Liu C, Zheng Q, Zhang W. Workload modeling for virtual machine-hosted application. Expert Systems with Applications 2014; 42(4): 1835–1844.
-
(2014)
Expert Systems with Applications
, vol.42
, Issue.4
, pp. 1835-1844
-
-
Zhang, W.1
Liu, J.2
Liu, C.3
Zheng, Q.4
Zhang, W.5
-
43
-
-
84865253327
-
Optimizing virtual machines using hybrid virtualization
-
Lin Q, Qi Z, Wu J, Dong Y, Guan H. Optimizing virtual machines using hybrid virtualization. Journal of Systems and Software 2012; 85:2593–2603.
-
(2012)
Journal of Systems and Software
, vol.85
, pp. 2593-2603
-
-
Lin, Q.1
Qi, Z.2
Wu, J.3
Dong, Y.4
Guan, H.5
-
44
-
-
79957476768
-
VMStore: distributed storage system for multiple virtual machines
-
Liao X, Li H, Jin H, Hou H, Jiang Y, Liu H. VMStore: distributed storage system for multiple virtual machines. Science China Information Sciences 2011; 54(6): 1104–1118.
-
(2011)
Science China Information Sciences
, vol.54
, Issue.6
, pp. 1104-1118
-
-
Liao, X.1
Li, H.2
Jin, H.3
Hou, H.4
Jiang, Y.5
Liu, H.6
-
45
-
-
67649342400
-
Reliable distributed storage
-
Chockler G, Guerraoui R, Keidar I, Vukolic M. Reliable distributed storage. IEEE Computer 2009; 42(4): 60–67.
-
(2009)
IEEE Computer
, vol.42
, Issue.4
, pp. 60-67
-
-
Chockler, G.1
Guerraoui, R.2
Keidar, I.3
Vukolic, M.4
-
46
-
-
84901446600
-
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
-
Gani A, Nayeem GM, Shiraz M, Sookhak M, Whaiduzzaman M, Khan S. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. Journal of Network and Computer Applications 2014; 43:84–102.
-
(2014)
Journal of Network and Computer Applications
, vol.43
, pp. 84-102
-
-
Gani, A.1
Nayeem, G.M.2
Shiraz, M.3
Sookhak, M.4
Whaiduzzaman, M.5
Khan, S.6
-
48
-
-
84902162108
-
Parallel programming paradigms and frameworks in big data era
-
Dobre C, Xhafa F. Parallel programming paradigms and frameworks in big data era. International Journal of Parallel Programming 2014; 42(5): 710–738.
-
(2014)
International Journal of Parallel Programming
, vol.42
, Issue.5
, pp. 710-738
-
-
Dobre, C.1
Xhafa, F.2
-
50
-
-
79851502837
-
-
Proceedings of 2010 IEEE International Conference on Communication Systems,, Singapore
-
Lei W, Hai W, Yu Y, Fei Z. Heterogeneous network in LTE-advanced system. Proceedings of 2010 IEEE International Conference on Communication Systems, Singapore; 2010; 156–160.
-
(2010)
Heterogeneous network in LTE-advanced system
, pp. 156-160
-
-
Lei, W.1
Hai, W.2
Yu, Y.3
Fei, Z.4
-
51
-
-
84906785344
-
Managing performance and power consumption tradeoff for multiple heterogeneous servers in cloud computing
-
Tian Y, Lin C, Li K. Managing performance and power consumption tradeoff for multiple heterogeneous servers in cloud computing. Cluster Computing 2014; 17:943–955.
-
(2014)
Cluster Computing
, vol.17
, pp. 943-955
-
-
Tian, Y.1
Lin, C.2
Li, K.3
-
52
-
-
79960906259
-
-
2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology,, Chennai
-
Barbu OE, Fratu O. Anenabler of interoperability in heterogeneous wireless networks. 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Chennai; 2011; 1–5.
-
(2011)
Anenabler of interoperability in heterogeneous wireless networks
, pp. 1-5
-
-
Barbu, O.E.1
Fratu, O.2
-
55
-
-
84992704370
-
Intelligent fuzzy anomaly detection of malicious software
-
Cao D, Qiu M, Chen Z, Hu F, Zhu Y, Wang B. Intelligent fuzzy anomaly detection of malicious software. International Journal of Advanced Intelligence 2012; 4(1): 69–86.
-
(2012)
International Journal of Advanced Intelligence
, vol.4
, Issue.1
, pp. 69-86
-
-
Cao, D.1
Qiu, M.2
Chen, Z.3
Hu, F.4
Zhu, Y.5
Wang, B.6
-
56
-
-
84866355973
-
Automatic network intrusion detection: current techniques and open issues
-
Catania CA, Garino CG. Automatic network intrusion detection: current techniques and open issues. Computers and Electrical Engineering 2012; 38:1062–1072.
-
(2012)
Computers and Electrical Engineering
, vol.38
, pp. 1062-1072
-
-
Catania, C.A.1
Garino, C.G.2
-
57
-
-
84967361943
-
-
Handbook of Security and Networks
-
Qiu M, Wu J, Huang H, Li W. Hardware Controlled Systematic Approach to Detect and Prevent Virus, Handbook of Security and Networks, 2011, 285–299.
-
(2011)
Hardware Controlled Systematic Approach to Detect and Prevent Virus
, pp. 285-299
-
-
Qiu, M.1
Wu, J.2
Huang, H.3
Li, W.4
-
58
-
-
84890079004
-
-
Proceedings of the sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks,, Oak Ridge National Laboratory, TN, USA
-
Stamouli I, Argyroudis PG, Tewari H. Real-time intrusion detection for ad hoc networks. Proceedings of the sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Oak Ridge National Laboratory, TN, USA, 2005; 374–380.
-
(2005)
Real-time intrusion detection for ad hoc networks
, pp. 374-380
-
-
Stamouli, I.1
Argyroudis, P.G.2
Tewari, H.3
-
59
-
-
84992747805
-
Automated signature creator for a signature based intrusion detection system with network attack detection capabilities
-
Ocampo F, Castillo T, Gomez M. Automated signature creator for a signature based intrusion detection system with network attack detection capabilities. International Journal of Cyber-Security and Digital Forensics 2013; 2:25–35.
-
(2013)
International Journal of Cyber-Security and Digital Forensics
, vol.2
, pp. 25-35
-
-
Ocampo, F.1
Castillo, T.2
Gomez, M.3
-
60
-
-
80053252436
-
Behaviour based worm detection and signature automation
-
Anbar M, Manickam S, Hosam A, Chai K, Baklizi M, Almomani A. Behaviour based worm detection and signature automation. Journal of Computer Science 2011; 7:1724–1728.
-
(2011)
Journal of Computer Science
, vol.7
, pp. 1724-1728
-
-
Anbar, M.1
Manickam, S.2
Hosam, A.3
Chai, K.4
Baklizi, M.5
Almomani, A.6
-
62
-
-
84901240193
-
EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
-
Meng W, Li W, Kwok L. EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers & Security 2014; 43:189–204.
-
(2014)
Computers & Security
, vol.43
, pp. 189-204
-
-
Meng, W.1
Li, W.2
Kwok, L.3
-
63
-
-
84901240193
-
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
-
Meng W, Li W, Kwok L. EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Computers & Security 2014; 43189–204.
-
(2014)
Computers & Security
, vol.43
, pp. 189-204
-
-
Meng, W.1
Li, W.2
Kwok, L.3
-
66
-
-
84885669666
-
-
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), IEEE,, Japan
-
Sha W, Zhu Y, Huang T, Qiu M, Zhu Y, Zhang Q. Amulti-order markov chain based scheme for anomaly detection. 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops (COMPSACW), IEEE, Japan. 2013; 83–88.
-
(2013)
Amulti-order markov chain based scheme for anomaly detection
, pp. 83-88
-
-
Sha, W.1
Zhu, Y.2
Huang, T.3
Qiu, M.4
Zhu, Y.5
Zhang, Q.6
-
67
-
-
84880119198
-
A comprehensive survey on anomaly-based intrusion detection in MANET
-
Kheyri D, Karami M. A comprehensive survey on anomaly-based intrusion detection in MANET. Computer and Information Science 2012; 5(4): 132–139.
-
(2012)
Computer and Information Science
, vol.5
, Issue.4
, pp. 132-139
-
-
Kheyri, D.1
Karami, M.2
-
68
-
-
84863721194
-
Statistical and signal based network traffic recognition for anomaly detection
-
Chora M, Saganowski L, Renk R, Houbowicz W. Statistical and signal based network traffic recognition for anomaly detection. Expert Systems. 2012; 29(3): 232–245.
-
(2012)
Expert Systems
, vol.29
, Issue.3
, pp. 232-245
-
-
Chora, M.1
Saganowski, L.2
Renk, R.3
Houbowicz, W.4
-
69
-
-
84992198818
-
Anomaly detection based on machine learning: dimensionality reduction using PCA and classification using SVM
-
George A. Anomaly detection based on machine learning: dimensionality reduction using PCA and classification using SVM. International Journal of Computer Applications 2012; 47(21): 5–8.
-
(2012)
International Journal of Computer Applications
, vol.47
, Issue.21
, pp. 5-8
-
-
George, A.1
-
72
-
-
84992755318
-
A review of clustering techniques based on machine learning approach in intrusion detection systems
-
Shakhatreh AYI, Bakar KA. A review of clustering techniques based on machine learning approach in intrusion detection systems. International Journal of Computer Science Issues 2011; 8(5): 373–381.
-
(2011)
International Journal of Computer Science Issues
, vol.8
, Issue.5
, pp. 373-381
-
-
Shakhatreh, A.Y.I.1
Bakar, K.A.2
-
73
-
-
84992755318
-
A review of clustering techniques based on machine learning approach in intrusion detection systems
-
Shakhatreh AYI, Bakar KA. A review of clustering techniques based on machine learning approach in intrusion detection systems. International Journal of Computer Science Issues 2011; 8(5): 373–381.
-
(2011)
International Journal of Computer Science Issues
, vol.8
, Issue.5
, pp. 373-381
-
-
Shakhatreh, A.Y.I.1
Bakar, K.A.2
-
74
-
-
74149086366
-
On the symbiosis of specification-based and anomaly-based detection
-
Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection. Computer & Security 2010; 29:253–268.
-
(2010)
Computer & Security
, vol.29
, pp. 253-268
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
75
-
-
74149086366
-
On the symbiosis of specification-based and anomaly-based detection
-
Stakhanova N, Basu S, Wong J. On the symbiosis of specification-based and anomaly-based detection. Computer & Security 2010; 29:253–268.
-
(2010)
Computer & Security
, vol.29
, pp. 253-268
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
77
-
-
84992691199
-
-
Symantec, November, [Accessed on December 2014]
-
Frederick KK. Network intrusion detection signatures, part five. Symantec, November 2010. http://www.symantec.com/connect/articles/network-intrusion-detection-signatures-part-five [Accessed on December 2014].
-
(2010)
Network intrusion detection signatures, part five
-
-
Frederick, K.K.1
-
78
-
-
42449117164
-
-
National Institute of Standards and Technology, Gaithersburg, MD, [Accessed on December 2014]
-
Scarfone K, Mell P. Guide to Intrusion Detection and Prevention Systems (IDPS), National Institute of Standards and Technology: Gaithersburg, MD, 2007. http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf [Accessed on December 2014].
-
(2007)
Guide to Intrusion Detection and Prevention Systems (IDPS)
-
-
Scarfone, K.1
Mell, P.2
-
80
-
-
84879894593
-
Protection of MANETs from a range of attacks using an intrusion detection and prevention system
-
Nadeem A, Howarth M. Protection of MANETs from a range of attacks using an intrusion detection and prevention system. Telecommunication Systems 2013; 52(4): 2047–2058.
-
(2013)
Telecommunication Systems
, vol.52
, Issue.4
, pp. 2047-2058
-
-
Nadeem, A.1
Howarth, M.2
-
81
-
-
79955920946
-
Cost and benefit analysis of authentication systems
-
Altinkemer K, Tawei W. Cost and benefit analysis of authentication systems. Decision Support System 2011; 51(3): 394–404.
-
(2011)
Decision Support System
, vol.51
, Issue.3
, pp. 394-404
-
-
Altinkemer, K.1
Tawei, W.2
-
84
-
-
80052256646
-
Biometric authentication: a review
-
Bhattacharyya D, Ranjan R, Alisherov FA, Choi M. Biometric authentication: a review. International Journal of U- and E-Service, Science andTechnology 2009; 2(3): 13–27.
-
(2009)
International Journal of U- and E-Service, Science andTechnology
, vol.2
, Issue.3
, pp. 13-27
-
-
Bhattacharyya, D.1
Ranjan, R.2
Alisherov, F.A.3
Choi, M.4
-
86
-
-
84872116385
-
Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication
-
Frank M, Biedert R, Ma E, Martinovic I, Song D. Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Transactions on Information Forensics and Security 2014; 8(1): 136–148.
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.1
, pp. 136-148
-
-
Frank, M.1
Biedert, R.2
Ma, E.3
Martinovic, I.4
Song, D.5
-
87
-
-
33645215766
-
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
-
Shao Z, Xue C, Zhuge Q, Qiu M, Xiao B, Sha E. Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Transactions on Computers 2006; 55(4): 443–453.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.4
, pp. 443-453
-
-
Shao, Z.1
Xue, C.2
Zhuge, Q.3
Qiu, M.4
Xiao, B.5
Sha, E.6
|