Found: 191
Select item for more details and to access through your institution.
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/4073940
- By:
- Publication type:
- Article
Compact Implementations of HIGHT Block Cipher on IoT Platforms.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5323578
- By:
- Publication type:
- Article
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6346708
- By:
- Publication type:
- Article
QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3107543
- By:
- Publication type:
- Article
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3086975
- By:
- Publication type:
- Article
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3031506
- By:
- Publication type:
- Article
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2031063
- By:
- Publication type:
- Article
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3038586
- By:
- Publication type:
- Article
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1901548
- By:
- Publication type:
- Article
F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5380710
- By:
- Publication type:
- Article
Cryptanalysis of the Lightweight Block Cipher BORON.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7862738
- By:
- Publication type:
- Article
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2509898
- By:
- Publication type:
- Article
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2136506
- By:
- Publication type:
- Article
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6757685
- By:
- Publication type:
- Article
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7871067
- By:
- Publication type:
- Article
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7429320
- By:
- Publication type:
- Article
Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8939041
- By:
- Publication type:
- Article
An API Semantics-Aware Malware Detection Method Based on Deep Learning.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1315047
- By:
- Publication type:
- Article
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2425983
- By:
- Publication type:
- Article
Analysis of DES Plaintext Recovery Based on BP Neural Network.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/9580862
- By:
- Publication type:
- Article
A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7937816
- By:
- Publication type:
- Article
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2317976
- By:
- Publication type:
- Article
MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3674274
- By:
- Publication type:
- Article
SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8171263
- By:
- Publication type:
- Article
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2182615
- By:
- Publication type:
- Article
An Indistinguishably Secure Function Encryption Scheme.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8567534
- By:
- Publication type:
- Article
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7193684
- By:
- Publication type:
- Article
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/9169802
- By:
- Publication type:
- Article
A Novel Construction of Constrained Verifiable Random Functions.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/4187892
- By:
- Publication type:
- Article
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/9038650
- By:
- Publication type:
- Article
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8357241
- By:
- Publication type:
- Article
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5076324
- By:
- Publication type:
- Article
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6124165
- By:
- Publication type:
- Article
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5175076
- By:
- Publication type:
- Article
Corrigendum to “Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment”.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2637028
- By:
- Publication type:
- Article
An Analysis of DDoS Attacks on the Instant Messengers.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1751285
- By:
- Publication type:
- Article
VPN Traffic Detection in SSL-Protected Channel.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7924690
- By:
- Publication type:
- Article
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2595794
- By:
- Publication type:
- Article
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/8467081
- By:
- Publication type:
- Article
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1431578
- By:
- Publication type:
- Article
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2387358
- By:
- Publication type:
- Article
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/3648671
- By:
- Publication type:
- Article
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/5278137
- By:
- Publication type:
- Article
Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators' Self-Assessment Errors.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7510809
- By:
- Publication type:
- Article
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1574749
- By:
- Publication type:
- Article
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/6989383
- By:
- Publication type:
- Article
Multidivisible Online/Offline Cryptography and Its Application to Signcryptions.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1042649
- By:
- Publication type:
- Article
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/7425235
- By:
- Publication type:
- Article
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/1949343
- By:
- Publication type:
- Article
An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2798571
- By:
- Publication type:
- Article