Journal: IJSN

Volume 12, Issue 3

135 -- 140Cheng Peng, Canqing Zhang, Cheng Peng, Junfeng Man. A reinforcement learning approach to map reduce auto-configuration under networked environment
141 -- 151Yuxia Shen. Distributed storage system model design in internet of things based on hash distribution
152 -- 167Guangcheng Zheng. Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system
168 -- 187Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing. Insider threat detection and its future directions
188 -- 197Gurdip Kaur, Renu Dhir, Maninder Singh. Anatomy of ransomware malware: detection, analysis and reporting
198 -- 205Baohong Li, Baojun Li, Yinliang Zhao. Generic construction of role-based encryption in the standard model