Search

Your search keyword '"Niu, Wenjia"' showing total 82 results

Search Constraints

Start Over You searched for: Author "Niu, Wenjia" Remove constraint Author: "Niu, Wenjia" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
82 results on '"Niu, Wenjia"'

Search Results

1. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud

2. Structural Analysis of IWA Social Network

3. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm

5. An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance

7. Hierarchical Workflow Management in Wireless Sensor Network

8. Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network

9. A Reference Model for Virtual Resource Description and Discovery in Virtual Networks

10. Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition

12. Similarity Based Semantic Web Service Match

23. A Data Recovery Method for NTFS Files System

24. Design and Implementation of Aircraft Pan-Tilt Control System Based on Mobile Terminal

25. The Design and Implementation of Data Security Management and Control Platform

26. Leakage Prevention Method for Unstructured Data Based on Classification

27. The Method and System Implementation of Unstructured Data Tracking and Forensics

28. Decryption and Forensic System for Encrypted iPhone Backup Files Based on Parallel Random Search

29. A Novel NB-SVM-Based Sentiment Analysis Algorithm in Cross-Cultural Communication

30. MIRD: Trigram-Based Malicious URL Detection Implanted with Random Domain Name Recognition

31. Time-Varying Impulsive Anticontrol of Discrete-Time System

32. RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching

33. Bayesian Reliability Assessment Method for Single NC Machine Tool Under Zero Failures

34. Modeling of Mobile Communication Systems by Electromagnetic Theory in the Direct and Single Reflected Propagation Scenario

35. A Clustering Approach for Detecting Auto-generated Botnet Domains

36. Trust Prediction Based on Interactive Relations Strength

37. A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing

38. OpenStack Vulnerability Detection and Analysis

39. Analysis and Exploit of Directory Traversal Vulnerability on VMware

40. Quantitative Evaluation Method of Cloud Security

41. Trust Prediction with Trust Antecedent Framework Regularization

42. Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data

43. A Differentially Private Method for Reward-Based Spatial Crowdsourcing

44. Discover Abnormal Behaviors Using HTTP Header Fields Measurement

45. Color Image Encryption in CIE L*a*b* Space

46. An Overview of Ad Hoc Network Security

47. Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis

48. A Lightweight Code-Based Authentication Protocol for RFID Systems

49. Public Key Timed-Release Attribute-Based Encryption

50. An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme

Catalog

Books, media, physical & digital resources