1 |
C. Jung, "Prioritized Data Transmission Mechanism for IoT," KSII Transactions on Internet and Information Systems, Vol. 14, No. 6, pp. 2333-2353, 2020. http://dx.doi.org/10.3837/tiis.2020.06.002/
|
|
2 |
A. Abid, M. F. Manzoor, M. S. Farooq, U. Farooq, and M. Hussain, "Challenges and Issues of Resource Allocation Techniques in Cloud Computing," KSII Transactions on Internet and Information Systems, Vol. 14, No. 7, pp. 2815-2839, 2020. http://dx.doi.org/10.3837/tiis.2020.07.005/
|
|
3 |
D. Li, J. Lan, and Y. Hu, "Central Control over Distributed Service Function Path," KSII Transactions on Internet and Information Systems, Vol. 14, No. 2, pp. 577-594, 2020. http://dx.doi.org/10.3837/tiis.2020.02.006/
|
|
4 |
L. Tan, D. Xuan, J. Xia and C. Wang, "Weather Recognition Based on 3C-CNN," KSII Transactions on Internet and Information Systems, vol. 14, no. 8, pp. 3567-3582, 2020. http://doi.org/10.3837/tiis.2020.08.024./
|
|
5 |
J. Su, R. Xu, S. Yu, B. Wang and J. Wang, "Redundant rule Detection for Software-Defined Networking," KSII Transactions on Internet and Information Systems, vol. 14, no. 6, pp. 2735-2751, 2020. https://doi.org/10.3837/tiis.2020.06.022/
|
|
6 |
Shahrzad Azizi and Davud Mohammadpur, "Searchable Encrypted String for Query Support on Different Encrypted Data Types", TIIS, Vol. 14, No. 10, 2020. https://doi.org/10.3837/tiis.2020.10.015/
|
|
7 |
J. Liu, H. Huang, Y. Zhong, J. He, T. Huang, Q. Xiao, and W. Jiang, "Joint wireless and computational resource allocation for ultra-dense mobile-edge computing networks," KSII Transactions on Internet and Information Systems, Vol. 14, No. 7, pp. 3134-3155, 2020. http://dx.doi.org/10.3837/tiis.2020.07.022./
|
|
8 |
J. S. Ko and J. Kwak, "Private key recovery on Bitcoin with duplicated signatures," KSII Transactions on Internet and Information Systems, vol. 14, no. 3, Mar. 2020./
|
|
9 |
S. C. Lee, J. H. Lee, S. P. Hong, and J. H. Kim, "Lightweight end-to-end Blockchain for IoT applications," KSII Transactions on Internet and Information Systems, vol. 14, no. 8, pp. 3224-3242, 2020./
|
|
10 |
S. Zhang, Y. Cao, Z. Ning, F. Xue, D. Cao, and Y. Yang, "A heterogeneous IoT node authentication scheme based on hybrid Blockchain and trust value," KSII Transactions on Internet and Information Systems, vol. 14, no. 9, Sep. 2020./
|
|