464 results on '"Merabti, Madjid"'
Search Results
102. A Novel Multi-Agent Planning System for Digital Interactive Storytelling
103. Consumer Communications and the Next Generation Broadcast Networks [Series editorial]
104. Cloud Computing Security & Privacy Challenges
105. A feasibility study of stateful automaton packet inspection for streaming application detection systems
106. Consumer communications and networking [Series Editorial]
107. A Zone-Based Hierarchial Framework and Clusteirng Scheme for Energy-Efficient Wireless Sensor Networks
108. Identity-based Attacks Against Reputation-based Systems in MANETs
109. Critical infrastructure protection: A 21st century challenge
110. A novel evaluation criteria to cloud based access control models
111. Identifying interdependencies using attack graph generation methods
112. On the evaluation of reputation and trust-based schemes in mobile ad hoc networks
113. Survey of solutions for Peer-to-Peer MMOGs
114. Hosting critical infrastructure services in the cloud environment considerations
115. A Fault-Tolerant Network Management Architecture for Wireless Sensor Networks
116. Design Considerations for Fault Management in Wireless Sensor Networks
117. A feasibility study of stateful automaton packet inspection for streaming application detection systems.
118. HOME NETWORKING
119. Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications
120. Improving Interoperation Security through Instrumentation and Analysis: A Framework and Case Study
121. Mobility and Appliance Networks — A New Mobility Model
122. Next Generation Body Area Networks and Smart Environments for Healthcare
123. Pypette
124. Dynamic Ridge Polynomial Neural Networks in Exchange Rates Time Series Forecasting
125. A secure scheme for a smart house based on Cloud of Things (CoT)
126. A Cloud of Things (CoT) Based Security for Home Area Network (HAN) in the Smart Grid
127. Coarticulation and speech synchronization in MPEG-4 based facial animation
128. An Elastic Scaling Method for Cloud Security
129. Big Data Analysis Techniques for Cyber-threat Detection in Critical Infrastructures
130. The Big Data Obstacle of Lifelogging
131. Spectrum sensing-energy tradeoff in multi-hop cluster based cooperative cognitive radio networks
132. Intelligent agents for automated cloud computing negotiation
133. Simulating Critical Infrastructure Cascading Failure
134. Behaviour analysis techniques for supporting critical infrastructure security
135. Using behavioural observation and game technology to support critical infrastructure security
136. Protecting critical infrastructures through behavioural observation
137. Analysis of a novel hybrid P2P architecture
138. Energy-efficient multi-hop clustering scheme for cooperative spectrum sensing in cognitive radio networks
139. A user-centred approach to reducing sedentary behaviour
140. Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems
141. Behavioural Observation for Critical Infrastructure Security Support
142. Trends in consumer communications [Series editorial]
143. Event Driven Monitoring of Composite Services
144. A Framework for Secure Service Composition
145. Survey and Evaluation of Mpeg-4 Based 3D Character Animation Frameworks
146. Secure rendering process in cloud computing
147. A novel scalable hybrid architecture for MMOG
148. Lightweight Sybil Attack Detection in MANETs
149. Trends in consumer communications: integration, integration, and integration [Series Editorial]
150. Keynote speech 3: Heterogeneous power supply sources: A challenge to SCADA systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.