Found: 34
Select item for more details and to access through your institution.
Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points †.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 5, p. 777, doi. 10.3390/sym13050777
- By:
- Publication type:
- Article
Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 557, doi. 10.3390/sym13040557
- By:
- Publication type:
- Article
Towards efficient and energy-aware query processing for industrial internet of things.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 6, p. 3895, doi. 10.1007/s12083-021-01163-w
- By:
- Publication type:
- Article
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 5, p. 2874, doi. 10.1007/s12083-021-01119-0
- By:
- Publication type:
- Article
Securing Open Banking with Model-View-Controller Architecture and OWASP.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/8028073
- By:
- Publication type:
- Article
Enhancing touch behavioral authentication via cost-based intelligent mechanism on smartphones.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 23, p. 30167, doi. 10.1007/s11042-018-6094-2
- By:
- Publication type:
- Article
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain.
- Published in:
- International Journal of Information Security, 2020, v. 19, n. 3, p. 279, doi. 10.1007/s10207-019-00462-x
- By:
- Publication type:
- Article
GPOD: An Efficient and Secure Graphical Password Authentication System by Fast Object Detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 19, p. 56569, doi. 10.1007/s11042-023-17571-4
- By:
- Publication type:
- Article
Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing.
- Published in:
- IET CyberPhysical Systems: Theory & Applications, 2024, v. 9, n. 2, p. 99, doi. 10.1049/cps2.12094
- By:
- Publication type:
- Article
Editorial: Security and Privacy Challenges in Internet of Things.
- Published in:
- 2022
- By:
- Publication type:
- Editorial
Editorial for special issue on security and trust on networked systems.
- Published in:
- International Journal of Network Management, 2023, v. 33, n. 3, p. 1, doi. 10.1002/nem.2229
- By:
- Publication type:
- Article
Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions.
- Published in:
- International Journal of Network Management, 2021, v. 31, n. 2, p. 1, doi. 10.1002/nem.2150
- By:
- Publication type:
- Article
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/7542726
- By:
- Publication type:
- Article
Machine Learning for Wireless Multimedia Data Security.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7682306
- By:
- Publication type:
- Article
Security Measures with Enhanced Behavior Processing and Footprint Algorithm against Sybil and Bogus Attacks in Vehicular Ad Hoc Network.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 10, p. 3538, doi. 10.3390/s21103538
- By:
- Publication type:
- Article
Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 9, p. 3041, doi. 10.3390/s21093041
- By:
- Publication type:
- Article
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 14, p. 3091, doi. 10.3390/s19143091
- By:
- Publication type:
- Article
Attribute-Based Information Flow Control.
- Published in:
- Computer Journal, 2019, v. 62, n. 8, p. 1214, doi. 10.1093/comjnl/bxz018
- By:
- Publication type:
- Article
Defending co‐resident attack using reputation‐based virtual machine deployment policy in cloud computing.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2021, v. 32, n. 9, p. 1, doi. 10.1002/ett.4271
- By:
- Publication type:
- Article
Dummy trajectory generation scheme based on generative adversarial networks.
- Published in:
- Neural Computing & Applications, 2023, v. 35, n. 11, p. 8453, doi. 10.1007/s00521-022-08121-4
- By:
- Publication type:
- Article
A novel rough set-based approach for minimum vertex cover of hypergraphs.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 24, p. 21793, doi. 10.1007/s00521-022-07620-8
- By:
- Publication type:
- Article
DVPPIR: privacy-preserving image retrieval based on DCNN and VHE.
- Published in:
- Neural Computing & Applications, 2022, v. 34, n. 17, p. 14355, doi. 10.1007/s00521-022-07286-2
- By:
- Publication type:
- Article
An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 1, p. 287, doi. 10.1002/int.22625
- By:
- Publication type:
- Article
对抗训练驱动的恶意代码检测增强方法.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2022, v. 43, n. 9, p. 169, doi. 10.11959/j.issn.1000-436x.2022171
- By:
- Publication type:
- Article
MLCT: A multi‐level contact tracing scheme with strong privacy.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 19, p. 1, doi. 10.1002/cpe.6929
- By:
- Publication type:
- Article
For a few diversities more: A voting‐attack‐immune voting scheme for social question and answer websites.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 16, p. 1, doi. 10.1002/cpe.5791
- By:
- Publication type:
- Article
Threshold identity authentication signature: Impersonation prevention in social network services.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 16, p. 1, doi. 10.1002/cpe.5787
- By:
- Publication type:
- Article
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 19, p. N.PAG, doi. 10.1002/cpe.5101
- By:
- Publication type:
- Article
Security, Trust, and Privacy in Machine Learning-Based Internet of Things.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/9851463
- By:
- Publication type:
- Article
Security, Privacy, and Trust on Internet of Things.
- Published in:
- Wireless Communications & Mobile Computing, 2019, p. 1, doi. 10.1155/2019/6452157
- By:
- Publication type:
- Article
Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3883, doi. 10.1002/sec.1307
- By:
- Publication type:
- Article
Information and Future Internet Security, Trust and Privacy.
- Published in:
- Future Internet, 2022, v. 14, n. 12, p. 372, doi. 10.3390/fi14120372
- By:
- Publication type:
- Article
Investigating the Influence of Special On--Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
- Published in:
- Future Internet, 2018, v. 10, n. 1, p. 6, doi. 10.3390/fi10010006
- By:
- Publication type:
- Article
SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology.
- Published in:
- International Journal of Distributed Sensor Networks, 2019, v. 15, n. 4, p. N.PAG, doi. 10.1177/1550147719844159
- By:
- Publication type:
- Article