• Login
    Browsing Computing Journal Articles by Title 
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Journal Articles
    • Browsing Computing Journal Articles by Title
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Journal Articles
    • Browsing Computing Journal Articles by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computing Journal Articles by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 44-50 of 50

    • title
    • date published
    • date added to RB
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        A Self-Organization Mechanism Based on Cross-Entropy Method for P2P-Like Applications 

        Sarrafzadeh, Hossein; Chen, Gang (2010)
        P2P-like applications are quickly gaining popularity in the Internet. Such applications are commonly modeled as graphs with nodes and edges. Usually nodes represent running processes that exchange information with each ...
      • Thumbnail

        Service provision control in federated service providing systems 

        Chen, Gang; Sarrafzadeh, Hossein; Pang, Shaoning (2013-03)
        Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP) system play a more active role by offering a variety of domain-specific services. The service provision control (SPC) problem ...
      • Thumbnail

        Social engineering attacks and countermeasures in the New Zealand banking system : advancing a user-reflective mitigation model 

        Airehrour, David; Nair, N.K.C.; Madanian, S. (MDPI (Multidisciplinary Digital Publishing Institute), 2018-05-03)
        Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in ...
      • Thumbnail

        Technical review : performance of existing imputation methods for missing data in SVM ensemble creation 

        Ali, Shahid; Dacey, Simon (AIRCC Publishing Corporation, 2017)
        Incomplete data is present in many study contents. This incomplete or uncollected data information is named as missing data (values), and considered as vital problem for various researchers. Even this missing data problem ...
      • Thumbnail

        A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks 

        Airehrour, David; Ray, J.; Ray, S. K. (RMIT University, Melbourne, Victoria, Australia, 2017-03-26)
        This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles ...
      • Thumbnail

        A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol 

        Airehrour, David; Gutierrez, J.; Ray, S. K. (TelSoc : Telecommunications and the Digital Economy, 2018-03-30)
        The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed ...
      • Thumbnail

        A View Framework for Modeling and Change Validation of Artifact-Centric Inter-Organizational Business Processes 

        Liu, Chengfei; Jian, Y.; Zhao, X.; Yongchareon, Sira (Elsevier, 2015)
        Over the past several years, more efficient approaches have been on increasing demands for designing, modeling, and implementing inter-organizational business processes. In the process collaboration across organizational ...

        Library home
        Send Feedback
        Research publications
        Unitec
        Moodle
        © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142
         

         

        Usage Statistics

        For this collectionFor the Research Bank

        About

        About Research BankResearch at UnitecContact us

        Help for authors  

        How to add researchOpen Access GuideVersions Toolkit

        Register for updates  

        LoginRegister

        Browse Research Bank  

        EverywhereAcademic study areasAuthorDateSubjectTitleType of researchSupervisorThis CollectionAuthorDateSubjectTitleType of researchSupervisor

        Library home
        Send Feedback
        Research publications
        Unitec
        Moodle
        © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142