An Automated Refactoring Approach to Improve IoT Software Quality
暂无分享,去创建一个
[1] Gustavo Pinto,et al. A large-scale study on the usage of Java's concurrent programming constructs , 2015, J. Syst. Softw..
[2] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[3] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[4] Yang Zhang,et al. Refactoring Java Programs for Customizable Locks Based on Bytecode Transformation , 2019, IEEE Access.
[5] Jiankun Hu,et al. Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.
[6] Xiaojiang Du,et al. Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City , 2020, IEEE Transactions on Computational Social Systems.
[7] Xiaojiang Du,et al. A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.
[8] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[9] Jinqiao Shi,et al. Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services , 2019, IEEE Internet of Things Journal.
[10] Martin C. Rinard,et al. Lock Coarsening: Eliminating Lock Overhead in Automatically Parallelized Object-Based Programs , 1998, J. Parallel Distributed Comput..
[11] HölzleUrs,et al. Removing unnecessary synchronization in Java , 1999 .
[12] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[13] Mohsen Guizani,et al. A data-driven method for future Internet route decision modeling , 2019, Future Gener. Comput. Syst..
[14] Mohsen Guizani,et al. Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.
[15] Xiangyu Zhang,et al. Automated Refactoring for Stampedlock , 2019, IEEE Access.
[16] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[17] Shen Su,et al. Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.
[18] Emin Gün Sirer,et al. Static Analyses for Eliminating Unnecessary Synchronization from Java Programs , 1999, SAS.
[19] Dongwen Zhang,et al. Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City , 2020, IEEE Transactions on Industrial Informatics.