Contents
Academic literature on the topic 'Cuckoo signatures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cuckoo signatures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cuckoo signatures"
Caves, Eleanor M., Martin Stevens, Edwin S. Iversen, and Claire N. Spottiswoode. "Hosts of avian brood parasites have evolved egg signatures with elevated information content." Proceedings of the Royal Society B: Biological Sciences 282, no. 1810 (July 7, 2015): 20150598. http://dx.doi.org/10.1098/rspb.2015.0598.
Full textUseche-Peláez, David Esteban, Daniel Orlando Díaz-López, Daniela Sepúlveda-Alzate, and Diego Edison Cabuya-Padilla. "Building malware classificators usable by State security agencies." ITECKNE 15, no. 2 (December 7, 2018): 107–21. http://dx.doi.org/10.15332/iteckne.v15i2.2072.
Full textKaur, Harjinder, and Gaganpreet Kaur. "Cuckoo Search based Optimization for Multimodal Biometrics (Signature, Speech and Palmprint)." International Journal of Computer Applications 107, no. 18 (December 18, 2014): 28–32. http://dx.doi.org/10.5120/18852-0399.
Full textRengarajan, A., and M. Mohammed Thaha. "SPCACF: Secured Privacy-Conserving Authentication Scheme using Cuckoo Filter in VANET." Scalable Computing: Practice and Experience 21, no. 1 (March 19, 2020): 101–5. http://dx.doi.org/10.12694/scpe.v21i1.1626.
Full textXie, Gaopeng, Yuling Liu, Guojiang Xin, and Qiuwei Yang. "Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency." Security and Communication Networks 2021 (April 29, 2021): 1–15. http://dx.doi.org/10.1155/2021/9921209.
Full textSiddiqui, Shadab, Manuj Darbari, and Diwakar Yagyasen. "Enhancing the Capability of Load Management Techniques in Cloud Using H_FAC Algorithm Optimization." International Journal of e-Collaboration 16, no. 2 (April 2020): 65–81. http://dx.doi.org/10.4018/ijec.2020040105.
Full text"Predicting the Dynamic Behaviour of Malware using RNN." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 3557–59. http://dx.doi.org/10.35940/ijeat.c6291.029320.
Full textDissertations / Theses on the topic "Cuckoo signatures"
Sidor, Samuel. "Vylepšený sandboxing pro pokročilé kmeny malwaru." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442403.
Full text