Linked e-resources

Details

Machine Learning in Distributed Networks
FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation
Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning
Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics
Blockchain Networks and Blockchain-based Applications
Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability
Toward Achieving Unanimity for Implicit Closings in a Trustless System
DBS: Blockchain-based privacy-preserving RBAC in IoT
5G Networks and Security
8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones
Anti-eavesdropping Proportional Fairness Access Control for 5G Networks
Joint Relay Selection and Frequency Allocationfor D2D Communications
IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
A Usability Study of Cryptographic API Design
An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher
The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function
Network Security 15 Topology Validator
Defense against Topology Poisoning Attack in SDN
Towards an Attention-based Accurate Intrusion Detection Approach
Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options
Privacy-preserving Emerging Networked Applications
Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy
Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.

Browse Subjects

Show more subjects...

Statistics

from
to
Export