International Journal of Security and Networks
2017 Vol.12 No.3
Pages | Title and author(s) |
135-140 | A reinforcement learning approach to map reduce auto-configuration under networked environmentCheng Peng; Canqing Zhang; Cheng Peng; Junfeng Man DOI: 10.1504/IJSN.2017.084342 |
141-151 | Distributed storage system model design in internet of things based on hash distributionYuxia Shen DOI: 10.1504/IJSN.2017.084388 |
152-167 | Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure systemGuangcheng Zheng DOI: 10.1504/IJSN.2017.084389 |
168-187 | Insider threat detection and its future directionsLi Ling Ko; Dinil Mon Divakaran; Yung Siang Liau; Vrizlynn L.L. Thing DOI: 10.1504/IJSN.2017.084391 |
188-197 | Anatomy of ransomware malware: detection, analysis and reportingGurdip Kaur; Renu Dhir; Maninder Singh DOI: 10.1504/IJSN.2017.084399 |
198-205 | Generic construction of role-based encryption in the standard modelBaoHong Li; BaoJun Li; YinLiang Zhao DOI: 10.1504/IJSN.2017.084400 |