
International Journal of Security and Networks
2017 Vol.12 No.3
| Pages | Title and author(s) |
| 135-140 | A reinforcement learning approach to map reduce auto-configuration under networked environmentCheng Peng; Canqing Zhang; Cheng Peng; Junfeng Man DOI: 10.1504/IJSN.2017.084342 |
| 141-151 | Distributed storage system model design in internet of things based on hash distributionYuxia Shen DOI: 10.1504/IJSN.2017.084388 |
| 152-167 | Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure systemGuangcheng Zheng DOI: 10.1504/IJSN.2017.084389 |
| 168-187 | Insider threat detection and its future directionsLi Ling Ko; Dinil Mon Divakaran; Yung Siang Liau; Vrizlynn L.L. Thing DOI: 10.1504/IJSN.2017.084391 |
| 188-197 | Anatomy of ransomware malware: detection, analysis and reportingGurdip Kaur; Renu Dhir; Maninder Singh DOI: 10.1504/IJSN.2017.084399 |
| 198-205 | Generic construction of role-based encryption in the standard modelBaoHong Li; BaoJun Li; YinLiang Zhao DOI: 10.1504/IJSN.2017.084400 |