Author:
Muthurajkumar S.,Vijayalakshmi M.,Kannan A.,Ganapathy S.
Publisher
Springer Science and Business Media LLC
Subject
Engineering (miscellaneous)
Reference9 articles.
1. Muthurajkumar S, Vijayalakshmi M, Kannan A (2015) Secured temporal log management techniques for cloud. Procedia Comput Sci 46:589–595
2. Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 271(2013):1–16
3. Ren K, Wang C, Wang Q (2012) Toward secure and effective data utilization in public cloud. IEEE Netw 26:69–74
4. Taner C, Abdul HZ, Derya Y (2012) Localized power-aware routing with an energy efficient pipelined wakeup schedule for wireless sensor networks. Turk J Electr Eng Comput Sci 20:964–978
5. Kan Y, Xiaohua J (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24:1717–1726
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献