Linked e-resources

Details

Network Security
A Characterisation of Smart Grid DoS Attacks
Security and Privacy in 5G Applications: Challenges and Solutions
Alarm Elements based Adaptive Network Security Situation Prediction Model
Watermark based Tor Cross-domain Tracking System For Tor Network Traceback
System Security
Research on IoT Security Technology and Standardization in the 5G Era
MIMEC Based Information System Security Situation Assessment Model
IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings
A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain
Machine Learning
Research on a Hybrid EMD-SVR Model for Time Series Prediction
Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity
User Identity Linkage across Social Networks based on Neural Tensor Network
An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System
A multi-class detection system for Android malicious Apps based on color image features
Authentication and Access Control
PUF-based Two-factor Group Authentication in Smart Home
An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems
Access Control for Wireless Body Area Networks
FIDO
that dog won't hunt
Blockchain-enabled user authentication in zero trust Internet of Things
Cloud Security
Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage
A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain
A Secure and Verifiable Outsourcing Scheme for Machine Learning Data
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing
Cryptography
Generative image steganography based on digital Cardan Grille
Pixel Grouping Based Image Hashing for DIBR 3D Image
Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP
Applied Cryptography
A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection
A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query
Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User
A3BAC: Attribute-Based Access Control Model with Anonymous Access
Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.

Browse Subjects

Show more subjects...

Statistics

from
to
Export