Author:
Poomagal C. T.,Sathish Kumar G. A.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference23 articles.
1. Shen, J., Zhou, T., Lai, C. F., Li, J., & Li, X. (2017). Hierarchical trust level evaluation for pervasive social networking. IEEE Access,5(99), 1178–1187. https://doi.org/10.1109/ACCESS.2017.2652486.
2. Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security,11(11), 2594–2608. https://doi.org/10.1109/TIFS.2016.2590944.
3. Leng, Y., & Zhao, L. (2011). Novel design of intelligent internet-of-vehicles management system based on cloud-computing and Internet-of-Things. In International conference on electronic and mechanical engineering and information technology (EMEIT, pp 3190–3193). Published in IEEE Xplore. https://doi.org/10.1109/EMEIT.2011.6023763.
4. Liang, W., Li, Z., Zhang, H., Wang, S., & Bie, R. (2015). Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends. International Journal of Distributed Sensor Networks, Special Issue Big Data and Knowledge Extraction for Cyber-Physical Systems. https://doi.org/10.1155/2015/745303.
5. Lazarevic, A., Srivastava, J., & Kumar, V. (2002). Cyber threat analysis—A key enabling technology for the objective force (a case study in network intrusion detection). In Proceedings of the IT/C4ISR, 23rd Army Science conference.
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献