최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.8, 2020년, pp.86777 - 86787
Kim, Hyunjin (Chungnam National University, Daejeon, South Korea) , Hong, Sang (Saint Leo University, School of Business, St Leo, USA) , Kim, Jinsul (Chonnam National University, School of Electronics and Computer Engineering, Gwangju, South Korea) , Ryou, Jaecheol (Chungnam National University, Daejeon, South Korea)
The emergence of vehicle-to-cloud (V2C) technology is changing cloud computing and transportation ecosystems. V2C technology enables the development of smart services, such as driving assistance and vehicle maintenance, that transmit information to the driver. Recent studies have primarily focused o...
Adv Cryptology Relations among notions of security for public-key encryption schemes mihir 1998 1462
Ki-Woong Park, Jaesun Han, JaeWoong Chung, Kyu Ho Park. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment. IEEE transactions on services computing, vol.6, no.3, 300-313.
IOSR Journal of Computer Engineering Survey of DDoS attacks based on TCP/IP protocol vulnerabilities acharya 2016 18 68
Kang, Won Min, Moon, Seo Yeon, Park, Jong Hyuk. An enhanced security framework for home appliances in smart home. Human-centric computing and information sciences, vol.7, no.1, 6-.
Proc 3rd Int Conf Comput Sustain Global Develop (INDIACom) DDoS attack algorithm using ICMP flood gupta 2016 4082
Proc Int Conf Netw Int Conf Syst Int Conf Mobile Commun Learn Technol (ICNICONSMCL06) Defending against TCP SYN flooding attacks under different types of IP spoofing chen 2006 38
Proc 7th Int Conf Netw Service Manage Witnessing distributed denial-of-service traffic from an attacker’s network seo 2011 1
Proc Optical Fiber Communication Conf (OFC) Network functions virtualization: Beyond carrier-grade clouds lopez 2014 1
Xu, Ruomeng, Cheng, Jieren, Wang, Fengkai, Tang, Xiangyan, Xu, Jinying. A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment. Symmetry, vol.11, no.1, 78-.
Zhang, Hongxia, Wang, Fei, Xu, Jiuyun, Guo, Jiashu. Selection and Configuration Optimization for Customizable Cloud Services. International journal of signal processing, image processing and pattern recognition, vol.9, no.4, 443-454.
Kumar, Kapil, Kaur, Pankaj Deep. A Novel Approach for Congestion Control in War State Battle Field Using Cloud Sensor for Collision Detection and Prevention. International journal of signal processing, image processing and pattern recognition, vol.8, no.8, 11-20.
Sheoran, Amit, Sharma, Puneet, Fahmy, Sonia, Saxena, Vinay. Contain-ed : An NFV Micro-Service System for Containing e2e Latency. Computer communication review, vol.47, no.5, 54-60.
Bitam, Salim, Mellouk, Abdelhamid, Zeadally, Sherali. VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE wireless communications, vol.22, no.1, 96-102.
Yoon, Hyun-Min, Liu, Zeqi, Yang, Woo-Suk, Kim, Jung-Ho, Lee, Jae-Oh. A Virtualized Application Service for QoS Management. International Journal of u- and e- Service, Science and Technology, vol.10, no.9, 49-60.
Singh, Navdeep, Kaur, Pankaj Deep. A Hybrid Approach for Encrypting Data on Cloud to prevent DoS Attacks. International journal of database theory and application, vol.8, no.3, 145-154.
2014
Gao, Honghao, Xu, Yueshen, Yin, Yuyu, Zhang, Weipeng, Li, Rui, Wang, Xinheng. Context-Aware QoS Prediction With Neural Collaborative Filtering for Internet-of-Things Services. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.7, no.5, 4532-4542.
Yu, Jun, Li, Jing, Yu, Zhou, Huang, Qingming. Multimodal Transformer With Multi-View Visual Representation for Image Captioning. IEEE transactions on circuits and systems for video technology : a publication of the Circuits and Systems Society, vol.30, no.12, 4467-4480.
Yu, Jun, Tan, Min, Zhang, Hongyuan, Rui, Yong, Tao, Dacheng. Hierarchical Deep Click Feature Prediction for Fine-Grained Image Recognition. IEEE transactions on pattern analysis and machine intelligence, vol.44, no.2, 563-578.
Yu, Jun, Kuang, Zhenzhong, Zhang, Baopeng, Zhang, Wei, Lin, Dan, Fan, Jianping. Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. IEEE transactions on information forensics and security, vol.13, no.5, 1317-1332.
Jin, Yi, Guo, Xingyan, Li, Yidong, Xing, Junliang, Tian, Hui. Towards stabilizing facial landmark detection and tracking via hierarchical filtering: A new method. Journal of the Franklin Institute, vol.357, no.5, 3019-3037.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.