Sfoglia per Autore
Asymptotic Load Balancing Algorithm for Many Task Scheduling
2019-01-01 Oncioiu, A. -R.; Pop, F.; Esposito, C.
Metamorphic malicious code behavior detection using probabilistic inference methods
2019-01-01 Choi, C.; Esposito, C.; Lee, M.; Choi, J.
CNN-based anti-spoofing two-tier multi-factor authentication system
2019-01-01 Sajjad, M.; Khan, S.; Hussain, T.; Muhammad, K.; Sangaiah, A. K.; Castiglione, A.; Esposito, C.; Baik, S. W.
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications
2019-01-01 Su, X.; Sperli, G.; Moscato, V.; Picariello, A.; Esposito, C.; Choi, C.
On data sovereignty in cloud-based computation offloading for smart cities applications
2019-01-01 Esposito, C.; Castiglione, A.; Frattini, F.; Cinque, M.; Yang, Y.; Choo, K. -K. R.
Floater: Post-disaster Communications via Floating Content
2019-01-01 Bonvin, F.; Manzo, G.; Esposito, C.; Braun, T.; Rizzo, G.
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication
2019-01-01 Lee, K.; Esposito, C.; Lee, S. -Y.
Game Theoretic Optimal User Association in Emergency Networks
2019-01-01 Esposito, C.; Zhao, Z.; Alcarria, R.; Rizzo, G.
IEEE access special section editorial: Recent advances on radio access and security methods in 5G networks
2019-01-01 Han, G.; Yu, F. R.; Chen, H. -C.; Shen, B.; Esposito, C.; Su, X.
Emergency Networks for Post-Disaster Scenarios
2020-01-01 Rizzo, Gianluca; Ristov, Sasko; Fahringer, Thomas; Gusev, Marjan; Dzanko, Matija; Bilic, Ivana; Esposito, Christian; Braun, Torsten
Resilience of 5G Mobile Communication Systems to Massive Disruptions
2020-01-01 Cinkler, Tibor; Ladanyi, Akos; Rak, Jacek; Esposito, Christian; Rizzo, Gianluca
Routing in Post-Disaster Scenarios
2020-01-01 Esposito, Christian; Zhao, Zhongliang; Rizzo, Gianluca; Pop, Florin; Apostol, Elena; Leordeanu, Cătălin; Preda, Stefan
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions
2020-01-01 Esposito, C.; Tamburis, O.; Choi, C.
Distributed Group Key Management for Event Notification Confidentiality among Sensors
2020-01-01 Esposito, Christian; Ficco, Massimo; Castiglione, Aniello; Palmieri, Francesco; De Santis, Alfredo
Adaptive Optimization Method in Digital Twin Conveyor Systems via Range-Inspection Control
2020-01-01 Wang, Tian; Cheng, Jiaxiang; Yang, Yi; Esposito, Christian; Snoussi, Hichem; Tao, Fei
FUSION—Fog Computing and Blockchain for Trusted Industrial Internet of Things
2020-01-01 Ceccarelli, Andrea; Cinque, Marcello; Esposito, Christian; Foschini, Luca; Giannelli, Carlo; Lollini, Paolo
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks
2020-01-01 Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F.
Robust Decentralised Trust Management for the Internet of Things by Using Game Theory
2020-01-01 Esposito, Christiancarmine; Tamburis, Oscar; Su, Xin; Choi, Chang
A night at the opera: A conceptual framework for an integrated distributed sensor network-based system to figure out safety protocols for animals under risk of fire †
2020-01-01 Tamburis, O.; Giannino, F.; D'Arco, M.; Tocchi, A.; Esposito, C.; Fiore, G. D.; Piscopo, N.; Esposito, L.
Evolutionary game theoretical on-line event detection over tweet streams
2020-01-01 Di Girolamo, Rocco; Esposito, Christian; Moscato, Vincenzo; Sperlí, Giancarlo
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Asymptotic Load Balancing Algorithm for Many Task Scheduling | 1-gen-2019 | Oncioiu, A. -R.; Pop, F.; Esposito, C. | |
Metamorphic malicious code behavior detection using probabilistic inference methods | 1-gen-2019 | Choi, C.; Esposito, C.; Lee, M.; Choi, J. | |
CNN-based anti-spoofing two-tier multi-factor authentication system | 1-gen-2019 | Sajjad, M.; Khan, S.; Hussain, T.; Muhammad, K.; Sangaiah, A. K.; Castiglione, A.; Esposito, C.; Baik, S. W. | |
An Edge Intelligence Empowered Recommender System Enabling Cultural Heritage Applications | 1-gen-2019 | Su, X.; Sperli, G.; Moscato, V.; Picariello, A.; Esposito, C.; Choi, C. | |
On data sovereignty in cloud-based computation offloading for smart cities applications | 1-gen-2019 | Esposito, C.; Castiglione, A.; Frattini, F.; Cinque, M.; Yang, Y.; Choo, K. -K. R. | |
Floater: Post-disaster Communications via Floating Content | 1-gen-2019 | Bonvin, F.; Manzo, G.; Esposito, C.; Braun, T.; Rizzo, G. | |
Vulnerability Analysis Challenges of the Mouse Data Based on Machine Learning for Image-Based User Authentication | 1-gen-2019 | Lee, K.; Esposito, C.; Lee, S. -Y. | |
Game Theoretic Optimal User Association in Emergency Networks | 1-gen-2019 | Esposito, C.; Zhao, Z.; Alcarria, R.; Rizzo, G. | |
IEEE access special section editorial: Recent advances on radio access and security methods in 5G networks | 1-gen-2019 | Han, G.; Yu, F. R.; Chen, H. -C.; Shen, B.; Esposito, C.; Su, X. | |
Emergency Networks for Post-Disaster Scenarios | 1-gen-2020 | Rizzo, Gianluca; Ristov, Sasko; Fahringer, Thomas; Gusev, Marjan; Dzanko, Matija; Bilic, Ivana; Esposito, Christian; Braun, Torsten | |
Resilience of 5G Mobile Communication Systems to Massive Disruptions | 1-gen-2020 | Cinkler, Tibor; Ladanyi, Akos; Rak, Jacek; Esposito, Christian; Rizzo, Gianluca | |
Routing in Post-Disaster Scenarios | 1-gen-2020 | Esposito, Christian; Zhao, Zhongliang; Rizzo, Gianluca; Pop, Florin; Apostol, Elena; Leordeanu, Cătălin; Preda, Stefan | |
Multimodal Neuroimaging Game Theoretic Data Fusion in Adversarial Conditions | 1-gen-2020 | Esposito, C.; Tamburis, O.; Choi, C. | |
Distributed Group Key Management for Event Notification Confidentiality among Sensors | 1-gen-2020 | Esposito, Christian; Ficco, Massimo; Castiglione, Aniello; Palmieri, Francesco; De Santis, Alfredo | |
Adaptive Optimization Method in Digital Twin Conveyor Systems via Range-Inspection Control | 1-gen-2020 | Wang, Tian; Cheng, Jiaxiang; Yang, Yi; Esposito, Christian; Snoussi, Hichem; Tao, Fei | |
FUSION—Fog Computing and Blockchain for Trusted Industrial Internet of Things | 1-gen-2020 | Ceccarelli, Andrea; Cinque, Marcello; Esposito, Christian; Foschini, Luca; Giannelli, Carlo; Lollini, Paolo | |
Trust Is in the Air: A New Adaptive Method to Evaluate Mobile Wireless Networks | 1-gen-2020 | Mocanu (Mihaita), A. -E.; Mocanu, B. -C.; Esposito, C.; Pop, F. | |
Robust Decentralised Trust Management for the Internet of Things by Using Game Theory | 1-gen-2020 | Esposito, Christiancarmine; Tamburis, Oscar; Su, Xin; Choi, Chang | |
A night at the opera: A conceptual framework for an integrated distributed sensor network-based system to figure out safety protocols for animals under risk of fire † | 1-gen-2020 | Tamburis, O.; Giannino, F.; D'Arco, M.; Tocchi, A.; Esposito, C.; Fiore, G. D.; Piscopo, N.; Esposito, L. | |
Evolutionary game theoretical on-line event detection over tweet streams | 1-gen-2020 | Di Girolamo, Rocco; Esposito, Christian; Moscato, Vincenzo; Sperlí, Giancarlo |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile