Search
Now showing items 1-7 of 7
The DoS attack risk calculation based on the entropy method and critical system resources usage
Publisher: IEEE
Year: 2014
Secure data collection in constrained tree-based Smart Grid environments
Publisher: IEEE
Year: 2014
Design and Implementation of Virtual Training Scenario Editing System of Emergency Disposal
Publisher: IEEE
Year: 2014
An Architecture for Private Cloud Storage System Based on Block Device
Publisher: IEEE
Year: 2014
FMRI unmixing via properly adjusted dictionary learning
Publisher: IEEE
Year: 2014
An improved cubature particle PHD filter with an adaptive memory factor
Publisher: IEEE
Year: 2014