Author:
Liu Jia,Li Mingchu,Alam Muhammad,Chen Yuanfang,Wu Ting
Funder
National Science Foundation of China
National Natural Science Foundation of China
Natural Science Foundation of Jiangsu Province
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference30 articles.
1. Ahmed AA, Jantan A, Wan TC (2015) Filtration model for the detection of malicious traffic in large-scale networks. Comput Commun 82:59–70
2. Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3/4):344–353
3. Chen Y, Crespi N, Ortiz AM, Shu L (2017) Reality mining: a prediction algorithm for disease dynamics based on mobile big data. Inform Sci 379:82–93
4. Chen Y, Lee GM, Lei S, Crespi N (2016) Industrial internet of things-based collaborative sensing intelligence: framework and research challenges. Sensors 16(2):215
5. Chen Y, Shu L, Crespi N, Lee GM, Guizani M (2016) Understanding the impact of network structure on propagation dynamics based on mobile big data, 1018–1023
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献