×
验证码:
换一张
忘记密码?
记住我
×
登录
中文
|
English
学校主页
|
图书馆
登录
注册
首页
学术成果
学院
学者
数据分析
检索
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
原始文献类型
收录类别
出版者
状态
学院
研究生院
1
个人在本单位外知识产出
10
作者
孟天晖
5
贾维嘉
3
王田
2
EZE Uchenna Cyril
1
文献类型
会议论文
5
期刊论文
4
专著
2
发表日期
2021
2
2018
1
2017
4
2016
1
2015
2
2008
1
更多...
语种
英语English
11
收录类别
SCIE
4
CPCI-S
3
CPCI-SSH
1
资助机构
关键词
Security attributes
3
Mobile offloading
2
Quantitative analysis
2
Security
2
big data
2
cloud computing
2
更多...
出处
Lecture Notes in Computer S...
3
2017 International Conferen...
1
Ad-Hoc and Sensor Wireless ...
1
IEEE Transactions on Mobile...
1
IEEE Transactions on Networ...
1
Innovation and Knowledge Ma...
1
更多...
资助项目
×
知识图谱
反馈留言
浏览/检索结果:共11条,第1-10条
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
发表日期升序
发表日期降序
题名升序
题名降序
期刊影响因子升序
期刊影响因子降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems
期刊论文
IEEE Transactions on Network Science and Engineering,2021, 卷号: 8, 期号: 3, 页码: 2087-2105
作者:
Huang, Shaobo
;
Liu, Anfeng
;
Zhang, Shaobo
;
Wang, Tian
;
Xiong, Neal N.
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/12/02
baseline data based verifiable trust evaluation
data collection
mobile vehicles
security
Smart network systems
unmanned aerial vehicles.
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning
期刊论文
IEEE Transactions on Mobile Computing,2021, 卷号: 22, 期号: 1, 页码: 237-252
作者:
Qian, Liping
;
Wu, Yuan
;
Yu, Ningning
;
Wang, Daohang
;
Jiang, Fuli
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/05/10
and Joint Computation and Communication Resource Allocations
Communication system security
Energy consumption
Multi-Access Mobile Edge Computing
Optimization
Resource management
Secrecydriven Computation Offloading
Servers
Task analysis
Wireless communication
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks
期刊论文
Pervasive and Mobile Computing,2018, 卷号: 45, 页码: 4-18
作者:
Meng, Tianhui
;
Wolter, Katinka
;
Wu, Huaming
;
Wang, Qiushi
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2025/02/20
Computation offloading
Mobile Cloud Computing
Security
Side-channel attack
An empirical performance and security evaluation of android container solutions
会议论文
2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, 19 June 2017-20 June 2017
作者:
Meng, Tianhui
;
Shang, Zhihao
;
Wolter, Katinka
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2025/02/20
Android container solution
Application Security
BYOD
Mobile Security
Timing attacks
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II
专著
United States:Springer, 2017
作者:
Bouguettaya, Athman
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I
专著
United States:Springer, 2017
作者:
Bouguettaya, Athman
;
Gao, Yunjun
;
Klimenko, Andrey
;
Chen, Lu
;
Zhang, Xiangliang
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/09/30
web mining
deep web
semantic web
big data
cloud computing
mobile web
social network
web intelligence
web data models
web engineering
web information retrieval
web privacy
web security
web search
web tools and languages
linked data
web integration
The chaotic video surveillance in mobile camera sensor networks: Improving the efficiency and security
期刊论文
Ad-Hoc and Sensor Wireless Networks,2017, 卷号: 37, 期号: 1-4, 页码: 95-115
作者:
Wang, Tian
;
Wang, Wenhua
;
Lai, Yongxuan
;
Wen, Sheng
;
Tian, Hui
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/12/02
Chaotic path planning algorithm
Mobile camera sensors
Randomness
Surveillance security
The stadia ant colony algorithm
Video surveillance
Analysis of mitigation measures for timing attacks in mobile-cloud offloading systems
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Munster, 4 April 2016- 6 April 2016
作者:
Meng, Tianhui
;
Wolter, Katinka
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2025/02/20
Mobile cloud offloading
Random delays
Security attributes
Timing side-channels
Security and performance tradeoff analysis of mobile offloading systems under timing attacks
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Madrid, SPAIN, AUG 31-SEP 01, 2015
作者:
Meng, Tianhui
;
Wolter, Katinka
;
Wang, Qiushi
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2025/02/20
Mobile offloading
Phase-type distribution
Quantitative analysis
Security attributes
Model-based quantitative security analysis of mobile offloading systems under timing attacks
会议论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Albena, BULGARIA, MAY 26-29, 2015
作者:
Meng, Tianhui
;
Wang, Qiushi
;
Wolter, Katinka
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2025/02/20
Mobile offloading
Quantitative analysis
Security attributes
Semi-Markov process