Linked e-resources

Details

Protecting Your Smartphone from Theft Using Accelerometer
Ransomware Attack Protection: A Cryptographic Approach
A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function
Blockchain-based Mobility Management for LTE and Beyond
EPT: EDNS Privacy Tunnel for DNS
Ensuring Data Integrity in Fog Computing Based Healthcare Systems
Modelling Security Requirements for Software Development with Common Criteria
Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique
A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection
Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning
End-to-end Encryption Schemes for Online Social Networks
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data
Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography
TLShps: SDN-based TLS Handshake Protocol Simplification for IoT
Data Protection Labware for Secure Mobile Software Development
Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task
Information Leakage in Wearable Applications
An Encryption based Approach to Protect Fog Federations from Rogue Nodes
Python Scrapers for Scraping Cryptomarkets on Tor
Characteristics of Bitcoin Transactions on Cryptomarkets
Effectiveness of Machine Learning based Intrusion Detection Systems
DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates
Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking
Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching
Using machine learning to find anomalies in fieldbus netwo rk traffic
Cyber Weapons Storage Mechanisms
A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm
Topic Model Based Android Malware Detection
A Verifiable Encryption Scheme Supporting Fuzzy Search
A Verifiable Fully Homomorphic Encryption Scheme
Secure Communication in UAV Assisted HetNets: A Proposed Model
Detection of Application-Layer Tunnels with Rules and Machine Learning
A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member
Automated Construction of Malware Families
A Closer Look At Anonymous Proxy Re-encryption Schemes
Approximate String Matching for DNS Anomaly Detection.

Browse Subjects

Show more subjects...

Statistics

from
to
Export