Mobile Computing and Sustainable Informatics最新文献

筛选
英文 中文
Execution Improvement of Intrusion Detection System Through Dimensionality Reduction for UNSW-NB15 Information UNSW-NB15信息降维改进入侵检测系统执行力
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_28
P. S. Kumar, S. Akthar
{"title":"Execution Improvement of Intrusion Detection System Through Dimensionality Reduction for UNSW-NB15 Information","authors":"P. S. Kumar, S. Akthar","doi":"10.1007/978-981-16-1866-6_28","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_28","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms 基于pca的机器学习入侵检测方法实验研究
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_18
G. Kumar, K. Venkata Seshanna, S. R. Basha, G. Babu
{"title":"An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms","authors":"G. Kumar, K. Venkata Seshanna, S. R. Basha, G. Babu","doi":"10.1007/978-981-16-1866-6_18","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_18","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125702938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks 基于openflow的软件定义网络动态流量分布
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_19
Duryodhan Chaulagain, Kumar Pudashine, Rajendra Paudyal, Sagar Mishra, S. Shakya
{"title":"OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks","authors":"Duryodhan Chaulagain, Kumar Pudashine, Rajendra Paudyal, Sagar Mishra, S. Shakya","doi":"10.1007/978-981-16-1866-6_19","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_19","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130097943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-organizing Data Processing for Time Series Using SPARK 基于SPARK的时间序列自组织数据处理
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_17
A. Bharambe, D. Kalbande
{"title":"Self-organizing Data Processing for Time Series Using SPARK","authors":"A. Bharambe, D. Kalbande","doi":"10.1007/978-981-16-1866-6_17","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_17","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129088543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
File Security Using Hybrid Cryptography and Face Recognition 使用混合密码和人脸识别的文件安全
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_38
Shekhar Khadka, Niranjan Shah, Rabin Shrestha, Santosh Acharya, Neha Karna
{"title":"File Security Using Hybrid Cryptography and Face Recognition","authors":"Shekhar Khadka, Niranjan Shah, Rabin Shrestha, Santosh Acharya, Neha Karna","doi":"10.1007/978-981-16-1866-6_38","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_38","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-Based and Optimized RPL Routing in Social Internet of Things Network 社交物联网网络中基于信任的RPL路由优化
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_36
S. Selvaraj, R. Thangarajan, M. Saravanan
{"title":"Trust-Based and Optimized RPL Routing in Social Internet of Things Network","authors":"S. Selvaraj, R. Thangarajan, M. Saravanan","doi":"10.1007/978-981-16-1866-6_36","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_36","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports MDTA:一种基于行为报告的Android恶意软件检测和威胁归因的监督机器学习新方法
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_10
S. Vanjire, M. Lakshmi
{"title":"MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports","authors":"S. Vanjire, M. Lakshmi","doi":"10.1007/978-981-16-1866-6_10","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_10","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness 测量数据中心效率和使用效果的实用方法
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_7
D. Mukherjee, Sandip Roy, R. Bose, Dolan Ghosh
{"title":"A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness","authors":"D. Mukherjee, Sandip Roy, R. Bose, Dolan Ghosh","doi":"10.1007/978-981-16-1866-6_7","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_7","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121508531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications 用于x波段应用的网络安全物联网可穿戴微带天线
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_2
R. P. Kumar, S. Smys, J. S. Raj, M. Kamarajan
{"title":"A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications","authors":"R. P. Kumar, S. Smys, J. S. Raj, M. Kamarajan","doi":"10.1007/978-981-16-1866-6_2","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_2","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128140856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of IP Core for ZigBee Transmitter and ECG Signal Analysis ZigBee发射机及心电信号分析IP核的设计
Mobile Computing and Sustainable Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-1866-6_26
K. Sarvesh, S. Chitra, S. Mohandass
{"title":"Design of IP Core for ZigBee Transmitter and ECG Signal Analysis","authors":"K. Sarvesh, S. Chitra, S. Mohandass","doi":"10.1007/978-981-16-1866-6_26","DOIUrl":"https://doi.org/10.1007/978-981-16-1866-6_26","url":null,"abstract":"","PeriodicalId":201495,"journal":{"name":"Mobile Computing and Sustainable Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信