67 results on '"Eder J"'
Search Results
2. VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events
3. CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling
4. SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses
5. SecRiskAI: a Machine Learning-Based Approach for Cybersecurity Risk Prediction in Businesses
6. Policy-based and Behavioral Framework to Detect Ransomware Affecting Resource-constrained Sensors
7. PMD-Track: Portable Medical Devices’ Real-time Inventory and Tracking
8. VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events
9. PMD-Track: Portable Medical Devices’ Real-time Inventory and Tracking
10. Security and Standardization of a Notary-based Blockchain Interoperability API
11. Poster: DDoSGrid: a Platform for the Post-mortem Analysis and Visualization of DDoS Attacks
12. Edge2BC: a Practical Approach for Edge-to-Blockchain IoT Transactions
13. LaFlector: a Privacy-preserving LiDAR-based Approach for Accurate Indoor Tracking
14. SecGrid: a Visual System for the Analysis and ML-based Classification of Cyberattack Traffic
15. FusIon Data Tracking System (FITS).
16. Edge2BC: a Practical Approach for Edge-to-Blockchain IoT Transactions
17. Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System
18. Analysis of Stablecoins during the Global COVID-19 Pandemic
19. SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management
20. SC-FLARE: Cooperative DDoS Signaling based on Smart Contracts
21. Automatic Personalisation of Study Guides in Flipped Classroom: A Case Study in a Distributed Systems Course
22. A Controlled Natural Language to Support Intent-based Blockchain Selection
23. PleBeuS: a Policy-based Blockchain Selection Framework
24. Bifröst: a Modular Blockchain Interoperability API
25. CaIV: Cast-as-Intended Verifiability in Blockchain-based Voting
26. Toward Mitigation-as-a-Service in Cooperative Network Defenses
27. A model for quantifying performance degradation in virtual network function service chains
28. Artificial neural network model to predict affinity for virtual network functions
29. Bifröst: a Modular Blockchain Interoperability API
30. Affinity measurement for NFV-enabled networks: A criteria-based approach
31. INSpIRE: Integrated NFV-based Intent Refinement Environment
32. AMNESiA: Affinity measurement platform for NFV-enabled networks
33. iMPROVE: Enhancing the Introduction of Services on Programmable Virtual Networks
34. Interactive Visualizations for Planning and Strategic Business Decisions in NFV-Enabled Networks
35. A model for quantifying performance degradation in virtual network function service chains
36. Policy-based dynamic service chaining in Network Functions Virtualization
37. DReAM - a distributed result-aware monitor for Network Functions Virtualization
38. INSpIRE: Integrated NFV-based Intent Refinement Environment
39. FENDE: Marketplace-Based Distribution, Execution, and Life Cycle Management of VNFs.
40. DReAM - a distributed result-aware monitor for Network Functions Virtualization
41. Policy-based dynamic service chaining in Network Functions Virtualization
42. Building web information systems using web services
43. Using Stateful Activities to Facilitate Monitoring and Repair in Workflow Choreographies
44. Response time histograms for composite Web services
45. Privacy Preservation Through Process Views.
46. Enhanced security management for flexible and dynamic cooperative environments.
47. Avoidance of deadline-violations for inter-organizational business processes.
48. Calculation of delay times for workflows with fixed-date constraints.
49. Incorporating ICD-9 and ICD-10 data in a warehouse.
50. Representing temporal data in non-temporal OLAP systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.