Linked e-resources

Details

Malware Analysis
Robustness of Image-Based Malware Analysis
Word Embeddings for Fake Malware Generation
Twitter bots detection with Benford’s Law and Machine Learning
Blockchain and Smart Contracts
A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection
Smart Contracts in the Cloud
A Blockchain-based Tamper-resistant Logging Framework
Remote Device Assessment
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks
Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.

Browse Subjects

Show more subjects...

Statistics

from
to
Export