咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 29 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 13 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 6 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 4 篇 理学
    • 3 篇 数学
    • 1 篇 生物学
  • 2 篇 文学
    • 2 篇 新闻传播学

主题

  • 8 篇 security
  • 5 篇 trusted computin...
  • 5 篇 privacy
  • 4 篇 servers
  • 4 篇 protocols
  • 2 篇 data privacy
  • 2 篇 ecosystems
  • 2 篇 computer archite...
  • 2 篇 throughput
  • 2 篇 ad hoc networks
  • 2 篇 radiofrequency i...
  • 2 篇 wireless sensor ...
  • 2 篇 computational mo...
  • 2 篇 radio frequency ...
  • 2 篇 analytical model...
  • 2 篇 software
  • 2 篇 unicast
  • 2 篇 encryption
  • 1 篇 table lookup
  • 1 篇 intrusion detect...

机构

  • 7 篇 advanced analysi...
  • 6 篇 advanced analysi...
  • 4 篇 advanced informa...
  • 3 篇 faculty of elect...
  • 2 篇 advanced analysi...
  • 2 篇 faculty of compu...
  • 2 篇 advanced analysi...
  • 2 篇 advanced analysi...
  • 2 篇 advanced analysi...
  • 2 篇 advanced analysi...
  • 2 篇 national institu...
  • 1 篇 advanced analysi...
  • 1 篇 advanced analysi...
  • 1 篇 department of co...
  • 1 篇 computer and mat...
  • 1 篇 computer and mat...
  • 1 篇 department of co...
  • 1 篇 mimos bhd. advan...
  • 1 篇 computer and inf...
  • 1 篇 faculty of engin...

作者

  • 12 篇 jamalul-lail ab ...
  • 7 篇 manan jamalul-la...
  • 4 篇 ab manan jamalul...
  • 2 篇 habibah hashim
  • 2 篇 nor kamariah noo...
  • 2 篇 mahmod ramlan
  • 2 篇 mohd anuar mat i...
  • 2 篇 norbik bashah id...
  • 2 篇 isa mohd anuar m...
  • 2 篇 honiden shinichi
  • 2 篇 khattak zubair a...
  • 2 篇 ramlan mahmod
  • 2 篇 zubair ahmad kha...
  • 2 篇 hashim habibah
  • 2 篇 su fong chien
  • 2 篇 mohd faizal muba...
  • 2 篇 borhanuddin mohd...
  • 2 篇 saadiah yahya
  • 2 篇 sulaiman suziah
  • 2 篇 mubarak mohd fai...

语言

  • 28 篇 英文
  • 1 篇 中文
检索条件"机构=Advanced Analysis and Modeling Cluster"
29 条 记 录,以下是1-10 订阅
排序:
An energy saving scheme for key management protocol in IEEE802.16e
An energy saving scheme for key management protocol in IEEE8...
收藏 引用
2013 1st IEEE TENCON Spring Conference, TENCONSpring 2013
作者: Gilanian-Sadeghi, Mohammad-Mehdi Mohd Ali, Borhanuddin Ab Manan, Jamalul-Lail Noordin, Nor Kamariah Hashim, Fazirulhisyam Faculty of Engineering Universiti Putra Malaysia 43400 UPM Serdang Selangor Malaysia Advanced Analysis and Modeling Cluster MIMOS Berhad Malaysia
In IEEE 802.16e, energy management is an important factor to be emphasized especially for Mobile Stations (MSs) due to their limitation on battery capabilities. Efficient energy scheme would guarantees long lifetime f... 详细信息
来源: 评论
An energy saving scheme for key management protocol in IEEE802.16e
An energy saving scheme for key management protocol in IEEE8...
收藏 引用
IEEE Region 10 Symposium
作者: Mohammad-Mehdi Gilanian-Sadeghi Borhanuddin Mohd Ali Jamalul-lail Ab Manan Nor Kamariah Noordin Fazirulhisyam Hashim Faculty of Engineering Universiti Putra Malaysia Serdang Selangor Malaysia Advanced Analysis and Modeling Cluster MIMOS Berhad Malaysia
In IEEE 802.16e, energy management is an important factor to be emphasized especially for Mobile Stations (MSs) due to their limitation on battery capabilities. Efficient energy scheme would guarantees long lifetime f... 详细信息
来源: 评论
Delay, throughput and packet absorption rate analysis of heterogeneous WMN
Delay, throughput and packet absorption rate analysis of het...
收藏 引用
IET International Conference on Wireless Communications and Applications, ICWCA 2012
作者: Chien, Su Fong Lo, Ka Kien Kwong, Kae Hsiang Poh, Geong Sen Chieng, David Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia Wireless Communications Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia
The pioneering work of Gupta and Kumar [1] has inspired many subsequent studies on asymptotically achievable per node throughput and delay analysis for wireless networks. In this paper, we evaluate the delay and maxim... 详细信息
来源: 评论
Distributed Intrusion Detection trust management through integrity and expertise evaluation
Distributed Intrusion Detection trust management through int...
收藏 引用
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
作者: Khorasanizadeh, Hadi Idris, Norbik Bashah Ab Manan, Jamalul-Lail Advanced Informatics School International Campus University Technology Malaysia Kuala Lumpur Malaysia Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatica... 详细信息
来源: 评论
Leveraging remote attestation to enhance the unified trust model for WSNs
Leveraging remote attestation to enhance the unified trust m...
收藏 引用
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
作者: Khiabani, Hamed Idris, Norbik Bashah Ab Manan, Jamalul-Lail Advanced Informatics School International Campus University Technology Malaysia Kuala Lumpur Malaysia Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia
Fetching information invisibly with the least human intervention in a pervasive computing environment raises several security and trust issues. Wireless sensor networks (WSNs) as the building block of pervasive comput... 详细信息
来源: 评论
Capacity analysis for heterogeneous wireless mesh networks with Queueing Network Models
Capacity analysis for heterogeneous wireless mesh networks w...
收藏 引用
Asia-Pacific Conference on Communications
作者: Su Fong Chien Kae Hsiang Kwong Derek William Holtby Advanced Analysis and Modeling Cluster MIMOS Berhad Kuala Lumpur Malaysia Advanced Analysis and Modeling Cluster Wireless Communications Cluster MIMOS Berhad Kuala Lumpur Malaysia
Gupta and Kumar [1] have shown that the throughput capacity which can be achieved is of order Θ(1/√(nlogn)) for wireless networks. In subsequent years, *** and Y.G. Fang thoroughly studied the same issue for both Re... 详细信息
来源: 评论
Delay, throughput and packet absorption rate analysis of heterogeneous WMN
Delay, throughput and packet absorption rate analysis of het...
收藏 引用
IET International Conference on Wireless Communications and Applications (ICWCA 2012)
作者: Su Fong Chien Ka Kien Lo Kae Hsiang Kwong Geong Sen Poh David Chieng Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia Advanced Analysis and Modeling Cluster Wireless Communications Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia
The pioneering work of Gupta and Kumar [1] has inspired many subsequent studies on asymptotically achievable per node throughput and delay analysis for wireless networks. In this paper, we evaluate the delay and maxim...
来源: 评论
Practicable unified Security, Trust and Privacy (STP) framework for Federated Access Management (FAM)
Practicable unified Security, Trust and Privacy (STP) framew...
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
作者: Manan, Jamalul-Lail Ab Khattak, Zubair Ahmad Sulaiman, Suziah Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia Kuala Lumpur Malaysia Department of Computer Information Sciences Universiti Teknologi PETRONAS Bandar Seri Iskandar 31750 Tronoh Perak Malaysia
In open environment there are always challenges in bridging the gap between Security, Trust and Privacy (STP) in Federated Access Management (FAM) systems. This challenge is mainly due to difficulties in providing a p... 详细信息
来源: 评论
Finest authorizing member of common criteria certification
Finest authorizing member of common criteria certification
收藏 引用
2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic, CyberSec 2012
作者: Isa, Mohd Anuar Mat Ab Manan, Jamalul-Lail Mahmod, Ramlan Hashim, Habibah Said, Mar Yah Udzir, Nur Izura Tanha, Ali Dehghan Faculty of Computer Science and Information Technology 43400 UPM Serdang Selangor Malaysia Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia 57000 Kuala Lumpur Malaysia Faculty of Electrical Engineering 40450 UiTM Shah Alam Selangor Malaysia
Globalization had changed the world landscape into borderless world without limits to sea, land and air space. The development of IT products and services need evaluation and certification. This paper discusses some s... 详细信息
来源: 评论
Integrity verification architecture (IVA) based security framework for windows operating system
Integrity verification architecture (IVA) based security fra...
收藏 引用
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
作者: Isa, Mohd Anuar Mat Hashim, Habibah Manan, Jamalul-Lail Ab Mahmod, Ramlan Othman, Hanunah Faculty of Electrical Engineering 40450 UiTM Shah Alam Selangor Malaysia Advanced Analysis and Modeling Cluster MIMOS Berhad Technology Park Malaysia 57000 Bukit Jalil Kuala Lumpur Malaysia Faculty of Computer Science and Information Technology 43400 UPM Serdang Selangor Malaysia
Windows Operating System (WinOS) emerged in the market for the past few decades to provide the solution for various platforms that range from desktop computer, server to sophisticated computing systems such as grid co... 详细信息
来源: 评论