Linked e-resources
Details
Table of Contents
Malware Analysis
Robustness of Image-Based Malware Analysis
Word Embeddings for Fake Malware Generation
Twitter bots detection with Benford’s Law and Machine Learning
Blockchain and Smart Contracts
A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection
Smart Contracts in the Cloud
A Blockchain-based Tamper-resistant Logging Framework
Remote Device Assessment
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks
Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.
Robustness of Image-Based Malware Analysis
Word Embeddings for Fake Malware Generation
Twitter bots detection with Benford’s Law and Machine Learning
Blockchain and Smart Contracts
A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection
Smart Contracts in the Cloud
A Blockchain-based Tamper-resistant Logging Framework
Remote Device Assessment
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks
Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.