Funder
National Science Foundation of China
Tianjin Research Program of Application Foundation and Advanced Technology
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference31 articles.
1. Intrusion detection techniques for mobile cloud computing in heterogeneous 5g;Gai;Secur. Commun. Netw.,2015
2. I. Butun, R. Sankar, A brief survey of access control in wireless sensor networks, in: Consumer Communications and Networking Conference, CCNC, 2011, pp. 1118–1119.
3. Energy efficient security algorithm for power grid wide area monitoring system;Qiu;IEEE Trans. Smart Grid,2011
4. Security-aware optimization for ubiquitous computing systems with seat graph approach;Qiu;J. Comput. System Sci.,2013
5. Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure;Dai;Future Gener. Comput. Syst.,2015
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献