Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

A Practical Machine Learning-Based Framework to Detect DNS Covert Communication in Enterprises
CacheLoc: Leveraging CDN Edge Servers for User Geolocation
Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems
Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic
TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning
A Brokerage Approach for Secure Multi-Cloud Storage Resource Management
On the Effectiveness of Behavior-based Ransomware Detection
PoQ: A Consensus Protocol for Private Blockchains Using Intel SGX Share Withholding in Blockchain Mining
PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range
Differentially Private Social Graph Publishing for Community Detection
LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network
A Machine Learning based Smartphone App for GPS Spoofing Detection
AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning
ML-Based Early Detection of IoT Botnets
Post-Quantum Cryptography in WireGuard VPN
Evaluating the Cost of Personnel Activities in Cybersecurity Management: a Case Study
SGX-Cube: An SGX-Enhanced Single Sign-On System against Server-side Credential Leakage
EW256357: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security
Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System
Private Global Generator Aggregation from Different Types of Local Models
Perturbing Smart Contract Execution through the Underlying Runtime
Blockchain based Multi-keyword Similarity Search Scheme over Encrypted Data
Using the Physical Layer to Detect Attacks on Building Automation Networks
Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain
Malware Classification using Attention-based Transductive Learning Network
COOB: Hybrid secure device pairing scheme in a hostile environment
A robust watermarking scheme with high security and low computational complexity
Selecting Privacy Enhancing Technologies for IoT-Based Services
Khopesh
Contact Tracing Without Sacrificing Privacy. .

Browse Subjects

Show more subjects...

Statistics

from
to
Export