Linked e-resources
Details
Table of Contents
AI and Quality of Service Driven Attack Detection, Mitigation and Energy Optimization: A Review of Some EU Project Results
Application of a Human-Centric Approach in Security by Design for IoT Architecture Development
An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction
Correlation-based Anomaly Detection for the CAN Bus
Botnet Attack Detection with Incremental Online Learning
Optimizing Energy Usage for an Electric Drone
T-RAID: TEE-based Remote Attestation for IoT Devices
Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints
Energy, QoS and Security Aware Services at the Edge
Mitigating the Massive Access Problem in the IoT.
Application of a Human-Centric Approach in Security by Design for IoT Architecture Development
An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction
Correlation-based Anomaly Detection for the CAN Bus
Botnet Attack Detection with Incremental Online Learning
Optimizing Energy Usage for an Electric Drone
T-RAID: TEE-based Remote Attestation for IoT Devices
Secure Authentication for everyone! Enabling 2nd-factor Authentication under Real-world constraints
Energy, QoS and Security Aware Services at the Edge
Mitigating the Massive Access Problem in the IoT.