Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Malware Analysis
Robustness of Image-Based Malware Analysis
Word Embeddings for Fake Malware Generation
Twitter bots detection with Benfords Law and Machine Learning
Blockchain and Smart Contracts
A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection
Smart Contracts in the Cloud
A Blockchain-based Tamper-resistant Logging Framework
Remote Device Assessment
Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks
Deep IoT Monitoring: Filtering IoT Traffic Using Deep Learning.

Browse Subjects

Show more subjects...

Statistics

from
to
Export