X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (187) 187
Conference Proceeding (78) 78
Publication (6) 6
Book / eBook (4) 4
Magazine Article (2) 2
Web Resource (2) 2
Book Chapter (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science, theory & methods (96) 96
computer science, software engineering (81) 81
cloud computing (44) 44
wireless sensor networks (41) 41
security (39) 39
privacy (38) 38
algorithms (34) 34
analysis (29) 29
computer simulation (27) 27
internet of things (27) 27
computer science, information systems (26) 26
sensors (24) 24
monitoring (22) 22
telecommunications (22) 22
engineering, electrical & electronic (21) 21
encryption (17) 17
big data (16) 16
cryptography (16) 16
servers (16) 16
iot (15) 15
fog computing (14) 14
computer science (13) 13
target tracking (12) 12
networks (11) 11
optimization (11) 11
wireless networks (11) 11
computer science, interdisciplinary applications (10) 10
computer security (10) 10
data collection (10) 10
social networks (10) 10
structural health monitoring (10) 10
computer architecture (9) 9
fault tolerance (9) 9
internet (9) 9
remote sensors (9) 9
authentication (8) 8
blockchain (8) 8
coverage (8) 8
energy consumption (8) 8
event detection (8) 8
propagation (8) 8
algorithm (7) 7
cloud (7) 7
collapsed structure (7) 7
computational modeling (7) 7
computer networks (7) 7
computer science, hardware & architecture (7) 7
data mining (7) 7
deep learning (7) 7
design (7) 7
edge computing (7) 7
electronic devices (7) 7
energy efficiency (7) 7
energy-efficiency (7) 7
machine learning (7) 7
models (7) 7
scheme (7) 7
wireless communication (7) 7
automation & control systems (6) 6
computation (6) 6
data encryption (6) 6
data security (6) 6
efficient (6) 6
engineering, industrial (6) 6
model (6) 6
protocol (6) 6
reliability (6) 6
shape (6) 6
simuliertes ergebnis (6) 6
access control (5) 5
algorithm design and analysis (5) 5
artificial intelligence (5) 5
bandwidth (5) 5
collaboration (5) 5
data integrity (5) 5
data management (5) 5
data models (5) 5
data privacy (5) 5
decision making (5) 5
drahtloses sensornetz (5) 5
event monitoring (5) 5
framework (5) 5
malware (5) 5
mathematical models (5) 5
medical services (5) 5
neural networks (5) 5
protocols (5) 5
recommender systems (5) 5
routing (5) 5
tracking (5) 5
vehicles (5) 5
accuracy (4) 4
artificial neural networks (4) 4
cloud storage (4) 4
clustering algorithms (4) 4
computer communication systems (4) 4
computer security congresses (4) 4
data acquisition (4) 4
data processing (4) 4
data retrieval (4) 4
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 04/2014, Volume 25, Issue 4, pp. 939 - 949
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 02/2015, Volume 64, Issue 2, pp. 382 - 395
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 07/2017, Volume 14, Issue 4, pp. 363 - 376
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 07/2015, Volume 64, Issue 7, pp. 1968 - 1982
Journal Article
IEEE Internet of Things Journal, ISSN 2327-4662, 06/2019, Volume 6, Issue 3, pp. 4831 - 4843
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 06/2018, Volume 83, pp. 208 - 218
The recent emergence of cloud computing has drastically influenced everyone’s perception of infrastructure architectures, data transmission and other aspects.... 
Fog computing | Cloud computing | Cyber security | Cloud storage | CLOUD | SECURITY | COMPUTER SCIENCE, THEORY & METHODS
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 02/2018, Volume 56, Issue 2, pp. 163 - 168
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 2018
In recent years, Sensor–Cloud System (SCS) has become a hot research issue. In this system, there are some cyber security problems that can be well solved by... 
Edge node | Misjudgment node | Fog Computing | Sensor–Cloud | Trust mechanism
Journal Article
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 12/2016, Volume 12, Issue 6, pp. 2103 - 2114
Journal Article
Concurrency and Computation: Practice and Experience, ISSN 1532-0626, 11/2019, Volume 31, Issue 21, p. n/a
Journal Article
IEEE Internet of Things Journal, ISSN 2327-4662, 06/2019, Volume 6, Issue 3, pp. 4272 - 4282
Journal Article
ACM Transactions on Sensor Networks (TOSN), ISSN 1550-4859, 11/2016, Volume 12, Issue 4, pp. 1 - 24
Traditional tracking solutions in wireless sensor networks based on fixed sensors have several critical problems. First, due to the mobility of targets, a lot... 
Wireless sensor networks | mobile nodes | target tracking | Target tracking | Mobile nodes | SOURCE LOCALIZATION | MECHANISM | PROTOCOLS | COMPUTER SCIENCE, INFORMATION SYSTEMS | COORDINATION | GUARANTEED DELIVERY | TELECOMMUNICATIONS | OBJECT TRACKING | Remote sensors | Networks | Tracking | Wireless networks | Tracking (position) | Mathematical models | Sensors
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 03/2018, Volume 56, Issue 3, pp. 128 - 133
Critical infrastructure monitoring is one of the most important applications of a smart city. The objective is to monitor the integrity of the structures... 
Big Data | Cloud computing | Smart cities | Computational modeling | Mathematical model | Monitoring | Flaw detection | Cracks | Data management | Health | Decision making | Structural damage | Data processing | Alliances | Real time | Data reduction
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.