Found: 27
Select item for more details and to access through your institution.
Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security.
- Published in:
- Symmetry (20738994), 2017, v. 9, n. 1, p. 9, doi. 10.3390/sym9010009
- By:
- Publication type:
- Article
Smartphone User Identity Verification Using Gait Characteristics.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 10, p. 100, doi. 10.3390/sym8100100
- By:
- Publication type:
- Article
A Model-Driven Framework to Develop Personalized Health Monitoring.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 7, p. 65, doi. 10.3390/sym8070065
- By:
- Publication type:
- Article
A Methodology and Tool for Investigation of Artifacts Left by the BitTorrent Client.
- Published in:
- Symmetry (20738994), 2016, v. 8, n. 6, p. 40, doi. 10.3390/sym8060040
- By:
- Publication type:
- Article
Kompiuterių ir operacinių sistemų saugos modulio programos sudarymas.
- Published in:
- Information Sciences / Informacijos Mokslai, 2009, v. 50, p. 187, doi. 10.15388/Im.2009.0.3240
- By:
- Publication type:
- Article
Korporacinių įmonių informacinės saugos architektūrų modeliavimas.
- Published in:
- Information Sciences / Informacijos Mokslai, 2007, v. 42/43, p. 175
- By:
- Publication type:
- Article
An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 14, p. 2716, doi. 10.3390/electronics13142716
- By:
- Publication type:
- Article
Enhancing Steganography through Optimized Quantization Tables.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 12, p. 2415, doi. 10.3390/electronics13122415
- By:
- Publication type:
- Article
Enhancing Communication Security an In-Vehicle Wireless Sensor Network.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 6, p. 1003, doi. 10.3390/electronics13061003
- By:
- Publication type:
- Article
The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 3, p. 591, doi. 10.3390/electronics12030591
- By:
- Publication type:
- Article
Framing Network Flow for Anomaly Detection Using Image Recognition and Federated Learning.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 19, p. 3138, doi. 10.3390/electronics11193138
- By:
- Publication type:
- Article
A Novel Approach for Network Intrusion Detection Using Multistage Deep Learning Image Recognition.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 15, p. 1854, doi. 10.3390/electronics10151854
- By:
- Publication type:
- Article
Method for Dynamic Service Orchestration in Fog Computing.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 15, p. 1796, doi. 10.3390/electronics10151796
- By:
- Publication type:
- Article
Ensemble-Based Classification Using Neural Networks and Machine Learning Models for Windows PE Malware Detection.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 4, p. 485, doi. 10.3390/electronics10040485
- By:
- Publication type:
- Article
Methodology to Investigate BitTorrent Sync Protocol.
- Published in:
- Computer Science & Information Systems, 2017, v. 14, n. 1, p. 197, doi. 10.2298/CSIS160212032V
- By:
- Publication type:
- Article
Enhancing Microservices Security with Token-Based Access Control Method.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 6, p. 3363, doi. 10.3390/s23063363
- By:
- Publication type:
- Article
Multi-Objective Path Optimization in Fog Architectures Using the Particle Swarm Optimization Approach.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 6, p. 3110, doi. 10.3390/s23063110
- By:
- Publication type:
- Article
Distributed Agent-Based Orchestrator Model for Fog Computing.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 15, p. 5894, doi. 10.3390/s22155894
- By:
- Publication type:
- Article
An Edge-Fog Secure Self-Authenticable Data Transfer Protocol.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 16, p. 3612, doi. 10.3390/s19163612
- By:
- Publication type:
- Article
Fuzzy Logic Type-2 Based Wireless Indoor Localization System for Navigation of Visually Impaired People in Buildings.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 9, p. 2114, doi. 10.3390/s19092114
- By:
- Publication type:
- Article
A Lightweight Protocol for Secure Video Streaming.
- Published in:
- Sensors (14248220), 2018, v. 18, n. 5, p. 1554, doi. 10.3390/s18051554
- By:
- Publication type:
- Article
Model-Driven Approach for Body Area Network Application Development.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 5, p. 670, doi. 10.3390/s16050670
- By:
- Publication type:
- Article
Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 16, p. 6872, doi. 10.3390/app14166872
- By:
- Publication type:
- Article
Educational Organization's Security Level Estimation Model.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 17, p. 8061, doi. 10.3390/app11178061
- By:
- Publication type:
- Article
Sustainable and Security Focused Multimodal Models for Distance Learning.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 6, p. 3414, doi. 10.3390/su14063414
- By:
- Publication type:
- Article
Models for Administration to Ensure the Successful Transition to Distance Learning during the Pandemic.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 9, p. 4751, doi. 10.3390/su13094751
- By:
- Publication type:
- Article
Multi-Agent Dynamic Fog Service Placement Approach.
- Published in:
- Future Internet, 2024, v. 16, n. 7, p. 248, doi. 10.3390/fi16070248
- By:
- Publication type:
- Article