Search
Now showing items 1-10 of 88
Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks
Publisher: IEEE
Year: 2014
Micro simulation of vehicle conflicts involving right turn vehicles at signalized intersections based on cellular automata
Publisher: Elsevier Science
Year: 2014
An Improved Max-Min Task-Scheduling Algorithm for Elastic Cloud
Publisher: IEEE
Year: 2014
A Hybrid Distributed Mutual Exclusion Algorithm
Year: 2006
Abstract:
and it involves passing many messages. The two major types of these algorithms are token-based and permission-based algorithms. In this research, we propose a hybrid distributed mutual exclusion algorithm. By Hybrid, we mean that the algorithm uses both token...
Android malware detection based on overlapping of static features
Year: 2017
Abstract:
in the literature, most of which are based on permissions. However, the permission-based methods are usually subverted by some bypass techniques such as over-claim of permissions, permission escalation attack, and zero permission attack. In this paper, an Android...
Application of contract-based verification techniques for hybrid automata to surgical robotic systems
Publisher: IEEE
Year: 2014
100+ Times Faster Weighted Median Filter (WMF)
Publisher: IEEE
Year: 2014
Genome wide association studies based on integrated dataset — Hirschsprung disease as a model
Publisher: IEEE
Year: 2014
Insect cell culture: Virus replication and applications in biotechnology
Publisher: Elsevier Science
Year: 2013
Severing reservations
Publisher: Cambridge University Press
Year: 2014