-
661
Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic
Published 2024-11-01Subjects: Get full text
Article -
662
Preamble retransmission assisted control-based mMTC dynamic random access
Published 2024-03-01Subjects: Get full text
Article -
663
Investigating the consequences of urban creep in Shahrekord
Published 2020-03-01Subjects: “…rural accession to the city…”
Get full text
Article -
664
Naval fleet across-domain communication scheme based on CP-ABE
Published 2015-11-01Subjects: Get full text
Article -
665
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01Subjects: Get full text
Article -
666
Access to justice in times of AI: towards a low-cost justice?
Published 2024-12-01Subjects: Get full text
Article -
667
Node clustered deployment of emergency Internet of things based on UAV with equipment access restriction
Published 2021-09-01Subjects: Get full text
Article -
668
The rural health initiative: Bridging gaps in healthcare access and grant-funded research in central Idaho
Published 2025-01-01Subjects: Get full text
Article -
669
A Dual Threshold Based Opportunistic Spectrum Access Policy with Non-Ideal Spectrum Sensing
Published 2014-08-01Subjects: “…opportunistic spectrum access…”
Get full text
Article -
670
Impact of overload factor on uplink SCMA system
Published 2018-06-01Subjects: Get full text
Article -
671
A cost-effective and miniaturized SPN deployment strategy for group customer dedicated lines
Published 2023-07-01Subjects: Get full text
Article -
672
Privacy-preserving attribute-based encryption scheme on ideal lattices
Published 2018-03-01Subjects: Get full text
Article -
673
Machine learning validation of the AVAS classification compared to ultrasound mapping in a multicentre study
Published 2025-01-01Subjects: “…Arteriovenous access…”
Get full text
Article -
674
Backoff algorithm in MAC layer for wireless multimedia sensor networks
Published 2010-01-01Subjects: Get full text
Article -
675
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01Subjects: Get full text
Article -
676
CAM-MAC: channel aware multi-channel MAC protocol in cognitive radio network
Published 2014-04-01Subjects: Get full text
Article -
677
Temporary Access to Documents Containing Medical Secrecy (Criminal Procedural Aspect)
Published 2020-02-01Subjects: Get full text
Article -
678
Highly reliable access algorithm for PD-NOMA based IoT with delay guarantee
Published 2020-09-01Subjects: “…non-orthogonal multiple access…”
Get full text
Article -
679
Analysis of software defined security model and architecture
Published 2017-06-01Subjects: “…access control…”
Get full text
Article -
680