设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
CNKI学位论文(527)
知网期刊论文(123)
在“
Elsevier电子期刊
”中,
命中:
37
条,耗时:0.028985 秒
在所有数据库中总计命中:
650
条
1.
A Biological Immune System (BIS) inspired
Mobile
Agent
Platform (MAP) security architecture
作者:
Pallavi Bagga
a
;
pallavibagga315@gmail.com
;
Rahul Hans
b
;
rahulhans@gmail.com
;
Vipul Sharma
b
;
vipuls85@gmail.com
关键词:
Malicious
mobile
agent
;
Nonce-based authentication
;
Pattern matching
;
N-gram feature extraction
;
Feature selection
;
K-nearest neighbor classification
刊名:Expert Systems with Applications
出版年:2017
2.
Tight bound on
mobile
Byzantine Agreement
作者:
Franç
;
ois Bonnet
a
;
f-bonnet@jaist.ac.jp" class="auth_mail" title="E-mail the corresponding author
;
Xavier Dé
;
fago
a
;
defago@jaist.ac.jp" class="auth_mail" title="E-mail the corresponding author
;
Thanh Dang Nguyen
a
;
c
;
thanh.nguyen@uclouvain.be" class="auth_mail" title="E-mail the corresponding author
;
Maria Potop-Butucaru
b
;
maria.potop-butucaru@lip6.fr" class="auth_mail" title="E-mail the corresponding author
关键词:
Distributed agreement
;
Byzantine fault tolerance
;
Mobile
faults
刊名:Theoretical Computer Science
出版年:2016
3.
Black hole search in computer networks: State-of-the-art, challenges and future directions
作者:
Mengfei Peng
a
;
mengfei.peng@uoit.ca" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Wei Shi
a
;
wei.shi@uoit.ca" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Jean-Pierre Corriveau
b
;
jeanpier@scs.carleton.ca" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Richard Pazzi
a
;
richard.pazzi@uoit.ca" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Yang Wang
c
;
yang.wang1@siat.ac.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Black hole search
;
Mobile
agent
s
;
Multiple black holes
;
Malicious
host
;
Network diagnosis
刊名:Journal of Parallel and Distributed Computing
出版年:2016
4.
MeDrone: On the use of a medical drone to heal a sensor network infected by a
malicious
epidemic
作者:
Nicola Roberto Zema
;
a
;
nicola.zema@hds.utc.fr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Enrico Natalizio
a
;
enrico.natalizio@hds.utc.fr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Giuseppe Ruggeri
b
;
giuseppe.ruggeri@unirc.it" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Michael Poss
c
;
michael.poss@lirmm.fr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Antonella Molinaro
b
;
antonella.molinaro@unirc.it" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Networks of autonomous
agent
s
;
Optimization
;
Sensor networks
刊名:Ad Hoc Networks
出版年:2016
5.
JuiceCaster: Towards automatic juice filming attacks on smartphones
作者:
Weizhi Meng
;
mengw@i2r.a-star.edu.sg" class="auth_mail" title="E-mail the corresponding author
;
Wang Hao Lee
whlee@i2r.a-star.edu.sg" class="auth_mail" title="E-mail the corresponding author
;
S.R. Murali
muralism@i2r.a-star.edu.sg" class="auth_mail" title="E-mail the corresponding author
;
S.P.T. Krishnan
krishnan@i2r.a-star.edu.sg" class="auth_mail" title="E-mail the corresponding author
关键词:
Mobile
security
;
Hardware-based attacks
;
User privacy
;
Android and iOS
;
Charging attacks
;
Cyber security
刊名:Journal of Network and Computer Applications
出版年:2016
6.
Improved periodic data retrieval in asynchronous rings with a faulty host
作者:
Evangelos Bampas
a
;
1
;
evangelos.bampas@labri.fr" class="auth_mail" title="E-mail the corresponding author
;
Nikos Leonardos
b
;
nikos.leonardos@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Euripides Markou
c
;
2
;
emarkou@ucg.gr" class="auth_mail" title="E-mail the corresponding author
;
Aris Pagourtzis
d
;
3
;
pagour@cs.ntua.gr" class="auth_mail" title="E-mail the corresponding author
;
Matoula Petrolia
e
;
stamatina.petrolia@univ-nantes.fr" class="auth_mail" title="E-mail the corresponding author
关键词:
Distributed algorithm
;
Mobile
agent
;
Periodic data retrieval
;
Malicious
host
;
Gray hole
;
Red hole
;
Unreliable whiteboard
刊名:Theoretical Computer Science
出版年:2015
7.
Fragmentation based encryption approach for self protected
mobile
agent
作者:
Shashank Srivastava
;
G.C. N
i
关键词:
AES
;
Fragmentation based encryption
;
Mobile
code
;
Mobile
agent
;
Self protected
mobile
agent
;
Formal modelling
刊名:Journal of King Saud University - Computer and Information Sciences
出版年:January, 2014
8.
Analyzing strategies of
mobile
agent
s on
malicious
cloud platform with Agent-Based Computational Economic Approach
作者:
Yung-Liang Lai
;
yungliang.lai@gmail.com
关键词:
Cloud computing
;
Mobile
agent
s
;
Malicious
platform
;
Agent
-Based Computational Economics
;
Mobile
Commerce
刊名:Expert Systems with Applications
出版年:2013
9.
Self-reliant
mobile
code: a new direction of
agent
security
作者:
Shashank Srivastava
;
G.C. N
i
关键词:
Mobile
agent
security
;
Self-protection
;
JADE
;
Formal proof
;
Integrity based confidentiality
刊名:Journal of Network and Computer Applications
出版年:January, 2014
10.
Energy and trust aware
mobile
agent
migration protocol for data aggregation in wireless sensor networks
作者:
Govind P. Gupta
a
;
gpg.india@gmail.com" class="auth_mail
;
gpgupta@outlook.com" class="auth_mail
;
Manoj Misra
a
;
Kumkum Garg
b
关键词:
Wireless sensor networks
;
Mobile
agent
s
;
Trust
;
Itinerary design
;
Security
;
Migration algorithm
刊名:Journal of Network and Computer Applications
出版年:May, 2014
1
2
3
4
按检索点细分(37)
题名(4)
关键词(7)
文摘(32)
按出版年细分(37)
2027年及以后(4)
2017年(1)
2016年(4)
2015年(1)
2013年(5)
2012年(2)
2010年(2)
2009年(3)
2007年(2)
2006年(4)
2004年(3)
2002年(2)
2001年(2)
2000年及以前(2)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.