Works matching DE "SECURE Sockets Layer (Computer network protocol)"
Results: 191
Performance Analysis of Different Link Layer Protocols in Wireless Sensor Networks (WSN).
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 4, p. 3075, doi. 10.1007/s11277-015-2783-6
- By:
- Publication type:
- Article
A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1145, doi. 10.1007/s11277-013-1559-0
- By:
- Publication type:
- Article
基于SSL VPN协议的客户端安全接入应用.
- Published in:
- Railway Signalling & Communication Engineering, 2022, v. 19, n. 2, p. 35, doi. 10.3969/j.issn.1673-4440.2022.02.008
- By:
- Publication type:
- Article
Data Security Architecture in Cloud Computing based on Elliptic Curve Cryptography with Special Focus on Lowering the Cipher Space.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 1, p. 417
- By:
- Publication type:
- Article
Leveraging Positive-Unlabeled Learning for Enhanced Black Spot Accident Identification on Greek Road Networks.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 2, p. 49, doi. 10.3390/computers13020049
- By:
- Publication type:
- Article
SPECIFICS OF IMPLEMENTATION OF THE ASYMMETRIC ENCRYPTION ALGORITHM ON ELLIPTIC CURVES.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2023, v. 15, n. 1, p. 1, doi. 10.15673/atbp.v15i1.2484
- By:
- Publication type:
- Article
RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 1, p. 130, doi. 10.18372/2225-5036.30.18614
- By:
- Publication type:
- Article
On Evaluating IoT Data Trust via Machine Learning.
- Published in:
- Future Internet, 2023, v. 15, n. 9, p. 309, doi. 10.3390/fi15090309
- By:
- Publication type:
- Article
FREDY: Federated Resilience Enhanced with Differential Privacy.
- Published in:
- Future Internet, 2023, v. 15, n. 9, p. 296, doi. 10.3390/fi15090296
- By:
- Publication type:
- Article
THE CONDRO GROUP HACK: INFILTRATING INSTANTSSL.it - A CASE STUDY.
- Published in:
- Journal of Information System Security, 2022, v. 18, n. 3, p. 177
- By:
- Publication type:
- Article
Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/5235714
- By:
- Publication type:
- Article
Explanation of clustering result based on multi-objective optimization.
- Published in:
- PLoS ONE, 2023, v. 18, n. 10, p. 1, doi. 10.1371/journal.pone.0292960
- By:
- Publication type:
- Article
Machine Learning-Based Characterization and Identification of Tertiary Lymphoid Structures Using Spatial Transcriptomics Data.
- Published in:
- International Journal of Molecular Sciences, 2024, v. 25, n. 7, p. 3887, doi. 10.3390/ijms25073887
- By:
- Publication type:
- Article
Semi-Supervised Domain Generalization with Stochastic StyleMatch.
- Published in:
- International Journal of Computer Vision, 2023, v. 131, n. 9, p. 2377, doi. 10.1007/s11263-023-01821-x
- By:
- Publication type:
- Article
RELAX: Representation Learning Explainability.
- Published in:
- International Journal of Computer Vision, 2023, v. 131, n. 6, p. 1584, doi. 10.1007/s11263-023-01773-2
- By:
- Publication type:
- Article
Data clustering: application and trends.
- Published in:
- Artificial Intelligence Review, 2023, v. 56, n. 7, p. 6439, doi. 10.1007/s10462-022-10325-y
- By:
- Publication type:
- Article
A Model for Transaction Authentication In Internet Banking.
- Published in:
- Egyptian Computer Science Journal, 2015, v. 39, n. 4, p. 43
- By:
- Publication type:
- Article
A Novel Calibration Method for Tri-axial Magnetometers Based on an Expanded Error Model and a Two-step Total Least Square Algorithm.
- Published in:
- Mobile Networks & Applications, 2022, v. 27, n. 2, p. 794, doi. 10.1007/s11036-021-01898-z
- By:
- Publication type:
- Article
Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 5, p. 848, doi. 10.1007/s11036-017-0851-8
- By:
- Publication type:
- Article
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 8, p. 3453, doi. 10.1007/s11276-022-03046-1
- By:
- Publication type:
- Article
FOR ALL THE THINGS: IN FRONT OF THE CONSOLE.
- Published in:
- Planetarian, 2024, v. 53, n. 1, p. 8
- By:
- Publication type:
- Article
THINGS ARE LOOKING BRIGHT IN FRONT OF THE CONSOLE.
- Published in:
- Planetarian, 2023, v. 52, n. 1, p. 8
- By:
- Publication type:
- Article
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features.
- Published in:
- Journal of Information & Communication Technology, 2022, v. 21, n. 3, p. 279, doi. 10.32890/jict2022.21.3.1
- By:
- Publication type:
- Article
Transport Layer Security.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 60, doi. 10.1109/MIC.2014.126
- By:
- Publication type:
- Article
Real-Time Communications Security on the Web.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 6, p. 8, doi. 10.1109/MIC.2014.117
- By:
- Publication type:
- Article
Layers of Success.
- Published in:
- IEEE Internet Computing, 2013, v. 17, n. 1, p. 3, doi. 10.1109/MIC.2013.12
- By:
- Publication type:
- Article
Web sites will have a hard time fighting Heartbleed.
- Published in:
- ComputerWorld Hong Kong, 2014, p. 7
- Publication type:
- Article
Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment.
- Published in:
- Wireless Personal Communications, 2023, v. 132, n. 1, p. 163, doi. 10.1007/s11277-023-10605-y
- By:
- Publication type:
- Article
Deep Learning-Enabled Heterogeneous Transfer Learning for Improved Network Attack Detection in Internal Networks.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 21, p. 12033, doi. 10.3390/app132112033
- By:
- Publication type:
- Article
Generative Adversarial Network-Based Anomaly Detection and Forecasting with Unlabeled Data for 5G Vertical Applications.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 19, p. 10745, doi. 10.3390/app131910745
- By:
- Publication type:
- Article
The Development of a Secure Internet Protocol (IP) Network Based on Asterisk Private Branch Exchange (PBX).
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 19, p. 10712, doi. 10.3390/app131910712
- By:
- Publication type:
- Article
Improved Learning-Automata-Based Clustering Method for Controlled Placement Problem in SDN.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 18, p. 10073, doi. 10.3390/app131810073
- By:
- Publication type:
- Article
Federated Learning-Based Analysis of Human Sentiments and Physical Activities in Natural Disasters.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 5, p. 2925, doi. 10.3390/app13052925
- By:
- Publication type:
- Article
Orchestrating Collaborative Research and Clinical Trials during COVID-19 Pandemic – A New Normal.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Unsupervised Detection and Clustering of Malicious TLS Flows.
- Published in:
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/3676692
- By:
- Publication type:
- Article
Automatic point cloud segmentation using RANSAC and DBSCAN algorithm for indoor model.
- Published in:
- Telkomnika, 2023, v. 21, n. 6, p. 1317, doi. 10.12928/TELKOMNIKA.v21i6.25299
- By:
- Publication type:
- Article
Data and Service Security of GNSS Sensors Integrated with Cryptographic Module.
- Published in:
- Micromachines, 2023, v. 14, n. 2, p. 454, doi. 10.3390/mi14020454
- By:
- Publication type:
- Article
Sound Event Detection in Domestic Environment Using Frequency-Dynamic Convolution and Local Attention.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 10, p. 534, doi. 10.3390/info14100534
- By:
- Publication type:
- Article
IMPLEMENTACIJA SSL BEZBEDNOSNIH PROTOKOLA NA APACHE WEB-SERVERU.
- Published in:
- InfoM, 2012, n. 43, p. 13
- By:
- Publication type:
- Article
TL-Net: A Novel Network for Transmission Line Scenes Classification.
- Published in:
- Energies (19961073), 2020, v. 13, n. 15, p. 3910, doi. 10.3390/en13153910
- By:
- Publication type:
- Article
Use of the iPhone 13 Pro LiDAR Scanner for Inspection and Measurement in the Mineshaft Sinking Process.
- Published in:
- Remote Sensing, 2023, v. 15, n. 21, p. 5089, doi. 10.3390/rs15215089
- By:
- Publication type:
- Article
A Feature-Level Point Cloud Fusion Method for Timber Volume of Forest Stands Estimation.
- Published in:
- Remote Sensing, 2023, v. 15, n. 12, p. 2995, doi. 10.3390/rs15122995
- By:
- Publication type:
- Article
New Trends in High-Resolution Imagery Processing.
- Published in:
- Remote Sensing, 2023, v. 15, n. 8, p. 2164, doi. 10.3390/rs15082164
- By:
- Publication type:
- Article
Suitable LiDAR Platform for Measuring the 3D Structure of Mangrove Forests.
- Published in:
- Remote Sensing, 2023, v. 15, n. 4, p. 1033, doi. 10.3390/rs15041033
- By:
- Publication type:
- Article
Assessment of Close-Range Remote Sensing Methods for DTM Estimation in a Lowland Deciduous Forest.
- Published in:
- Remote Sensing, 2021, v. 13, n. 11, p. 2063, doi. 10.3390/rs13112063
- By:
- Publication type:
- Article
Stacked Autoencoders Driven by Semi-Supervised Learning for Building Extraction from near Infrared Remote Sensing Imagery.
- Published in:
- Remote Sensing, 2021, v. 13, n. 3, p. 371, doi. 10.3390/rs13030371
- By:
- Publication type:
- Article
API Misuse Detection in C Programs: Practice on SSL APIs.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2019, v. 29, n. 11/12, p. 1761, doi. 10.1142/S0218194019400205
- By:
- Publication type:
- Article
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting.
- Published in:
- EURASIP Journal on Information Security, 2016, v. 2016, p. 1, doi. 10.1186/s13635-016-0030-7
- By:
- Publication type:
- Article
Mixed Re-Sampled Class-Imbalanced Semi-Supervised Learning for Skin Lesion Classification.
- Published in:
- Intelligent Automation & Soft Computing, 2021, v. 28, n. 1, p. 195, doi. 10.32604/iasc.2021.016314
- By:
- Publication type:
- Article
The Use of SSL and TLS Protocols in Providing a Secure Environment for e-commerce Sites.
- Published in:
- Webology, 2020, v. 17, n. 2, p. 503, doi. 10.14704/WEB/V17I2/WEB17048
- By:
- Publication type:
- Article