 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
Y. Lakhdhar, S. Rekhis, N. Boudriga: A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios /jucs_25_9/a_context_based_defense |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang: Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime /jucs_16_10/cross_layer_optimization_for |
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
|
|
 |
H. Zhou, K.M. Hou, L. Gineste, C. De Vaulx, J. Ponsonnaille: A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring /jucs_12_1/a_new_system_dedicated |
|