135 | -- | 140 | Cheng Peng, Canqing Zhang, Cheng Peng, Junfeng Man. A reinforcement learning approach to map reduce auto-configuration under networked environment |
141 | -- | 151 | Yuxia Shen. Distributed storage system model design in internet of things based on hash distribution |
152 | -- | 167 | Guangcheng Zheng. Optimisation methods for performance of communication interaction based on cooperative vehicle infrastructure system |
168 | -- | 187 | Li Ling Ko, Dinil Mon Divakaran, Yung Siang Liau, Vrizlynn L. L. Thing. Insider threat detection and its future directions |
188 | -- | 197 | Gurdip Kaur, Renu Dhir, Maninder Singh. Anatomy of ransomware malware: detection, analysis and reporting |
198 | -- | 205 | Baohong Li, Baojun Li, Yinliang Zhao. Generic construction of role-based encryption in the standard model |