Linked e-resources

Details

Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems
Evading Static and Dynamic Android Malware Detection Mechanisms
Multilevel Secure Container Deployment Framework in Edge Computing
Deep Hierarchical APP Recommendation with Dynamic Behaviors
New Security Architecture of Access Control in 5G MEC
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments
A Survey of Security Attacks on Silicon Based Weak PUF Architectures
On the Feasibility of DoS Attack on Smart Door Lock IoT Network
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning
Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection
Thermal Management in Large Data Centres: Security Threats and Mitigation
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data
Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm
SaaS
Microservices-Based Scalable Smart Contract Architecture
GIDS: Anomaly Detection Using Generative Adversarial Networks
Audio Steganography Using Multi LSB and IGS Techniques
A Forensic Analysis on the Availability of MQTT Network Traffic
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications
Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.

Browse Subjects

Show more subjects...

Statistics

from
to
Export