Publisher: Inderscience Publishers
Founded in: 2013
Total resources: 3
E-ISSN: 2048-8386
ISSN: 2048-8378
Subject: TP3 Computers
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
International Journal of Trust Management in Computing and Communications
Menu
GTC: a geographical topology control protocol to conserve energy in wireless sensor networks
By Zebbane B.,Chenait M.,Badache N. in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.By Dutt Varun,Kaur Amanjot in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Slow DoS attacks: definition and categorisation
By Cambiaso Enrico,Papaleo Gianluca,Chiola Giovanni,Aiello Maurizio in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Archimedean copula-based estimation of distribution algorithm for multi-objective optimisation
By Gao Ying,Peng Lingxi,Li Fufang,Liu Miao,Liu Waixi in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Selective opportunistic routing based on QoS in wireless mesh network
By Rizk Rawya,Gamal Marwa,Marie Mahmoud in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Enhanced t-closeness for balancing utility and privacy
By Babu Korra Sathya,Pillelli Rajesh,Jena Sanjay Kumar in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Theory and implementation of a virtualisation level Future Internet defence in depth architecture
By Konorski Jerzy,Pacyna Piotr,Kolaczek Grzegorz,Kotulski Zbigniew,Cabaj Krzysztof,Szalachowski Pawel in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Fuzzy logic-based detection of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network
By Balarengadurai C.,Saraswathi S. in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 3-4, 2013-09 , pp.Simulating a trust-based service recommender system for decentralised user modelling environment
By Nusrat Sabrina,Vassileva Julita in (2013)
International Journal of Trust Management in Computing and Communications , Vol. 1, Iss. 2, 2013-04 , pp.