X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
algorithms (2) 2
trust mechanism (2) 2
cloud computing (1) 1
coefficient-triangle apit location (1) 1
collaboration (1) 1
collaborative communication (1) 1
computer simulation (1) 1
delays (1) 1
detection algorithm (1) 1
discriminant analysis (1) 1
edge node (1) 1
electronic computers. computer science (1) 1
error evaluation (1) 1
factor analysis (1) 1
fog based (1) 1
fog computing (1) 1
hidden data attacks (1) 1
in-to-out misjudgment (1) 1
indoor positioning (1) 1
industrial engineering. management engineering (1) 1
iterative methods (1) 1
leaves (1) 1
localization (1) 1
mathematical analysis (1) 1
methods (1) 1
misjudgment (1) 1
misjudgment node (1) 1
misjudgment nodes (1) 1
misjudgment probability (1) 1
monitor (1) 1
monitoring (1) 1
opportunistic networks (1) 1
peer-to-peer computing (1) 1
photosynthesis (1) 1
power consumption (1) 1
research (1) 1
routing (1) 1
security (1) 1
selfish node (1) 1
sensor cloud (1) 1
sensor–cloud (1) 1
signal strength (1) 1
snow crystals (1) 1
snowflake theory (1) 1
structure (1) 1
triangulation (1) 1
wireless sensor networks (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Future Generation Computer Systems, ISSN 0167-739X, 2018
In recent years, Sensor–Cloud System (SCS) has become a hot research issue. In this system, there are some cyber security problems that can be well solved by... 
Edge node | Misjudgment node | Fog Computing | Sensor–Cloud | Trust mechanism
Journal Article
Tongxin Xuebao/Journal on Communications, ISSN 1000-436X, 03/2016, Volume 37, Issue 3, pp. 1 - 7
Journal Article
2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 12/2017, pp. 481 - 485
In recent years, Sensor-Cloud has become a hot issue. In this structure, there are some security problems that can be well solved by trust mechanism. However,... 
Wireless sensor networks | Cloud computing | trust mechanism | fog based | Routing | Sensor Cloud | misjudgment nodes | Peer-to-peer computing | Delays | Security | hidden data attacks | Monitoring | Hidden data attacks | Fog based | Misjudgment nodes | Trust mechanism
Conference Proceeding
Algorithms, ISSN 1999-4893, 12/2017, Volume 10, Issue 4, p. 131
Journal Article
Journal of Computers (Finland), ISSN 1796-203X, 2013, Volume 8, Issue 6, pp. 1520 - 1527
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.