Found: 34
Select item for more details and to access through your institution.
Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2366
- By:
- Publication type:
- Article
Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme.
- Published in:
- Duzce University Journal of Science & Technology, 2022, v. 10, n. 2, p. 893, doi. 10.29130/dubited.979040
- By:
- Publication type:
- Article
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2043
- By:
- Publication type:
- Article
Password authenticated key exchange-based on Kyber for mobile devices.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.1960
- By:
- Publication type:
- Article
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.1791
- By:
- Publication type:
- Article
Modified graph-based algorithm to analyze security threats in IoT.
- Published in:
- PeerJ Computer Science, 2023, p. 1, doi. 10.7717/peerj-cs.1743
- By:
- Publication type:
- Article
A new hybrid method combining search and direct based construction ideas to generate all 4 ×4 involutory maximum distance separable (MDS) matrices over binary field extensions.
- Published in:
- PeerJ Computer Science, 2023, p. 1, doi. 10.7717/peerj-cs.1577
- By:
- Publication type:
- Article
Modelling and verification of post-quantum key encapsulation mechanisms using Maude.
- Published in:
- PeerJ Computer Science, 2023, p. 1, doi. 10.7717/peerj-cs.1547
- By:
- Publication type:
- Article
SDN-IoT: SDN-based efficient clustering scheme for IoT using improved Sailfish optimization algorithm.
- Published in:
- PeerJ Computer Science, 2023, p. 1, doi. 10.7717/peerj-cs.1424
- By:
- Publication type:
- Article
KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2020, v. 8, n. 5, p. 90, doi. 10.21923/jesd.831775
- By:
- Publication type:
- Article
NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2020, v. 8, n. 5, p. 80, doi. 10.21923/jesd.831844
- By:
- Publication type:
- Article
KAPALI MEKAN KONUMLANDIRMA ÜZERİNE BİR ÇALIŞMA.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2020, v. 8, p. 90, doi. 10.21923/jesd.831775
- By:
- Publication type:
- Article
NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA.
- Published in:
- SDU Journal of Engineering Sciences & Design / Mühendislik Bilimleri ve Tasarım Dergisi, 2020, v. 8, p. 80, doi. 10.21923/jesd.831844
- By:
- Publication type:
- Article
MaTRU‐KE revisited: CCA2‐secure key establishment protocol based on MaTRU.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 7, p. 1, doi. 10.1002/dac.4326
- By:
- Publication type:
- Article
A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security.
- Published in:
- Manas Journal of Engineering, 2024, v. 12, n. 1, p. 1, doi. 10.51354/mjen.1197753
- By:
- Publication type:
- Article
Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 14, p. 1618, doi. 10.3390/math9141618
- By:
- Publication type:
- Article
Efficient Nyberg-Rueppel type of NTRU digital signature algorithm.
- Published in:
- Turkish Journal of Mathematics, 2022, v. 46, n. 1, p. 59, doi. 10.3906/mat-2102-116
- By:
- Publication type:
- Article
A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials.
- Published in:
- Turkish Journal of Mathematics, 2019, v. 43, n. 1, p. 241, doi. 10.3906/mat-1803-92
- By:
- Publication type:
- Article
A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes.
- Published in:
- RAIRO - Theoretical Informatics & Applications, 2021, v. 55, p. 1, doi. 10.1051/ita/2021010
- By:
- Publication type:
- Article
A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 4, p. 903, doi. 10.3390/s19040903
- By:
- Publication type:
- Article
A New Short Signature Scheme with Random Oracle from Bilinear Pairings.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 5, doi. 10.26636/jtit.2011.1.1125
- By:
- Publication type:
- Article
A novel permission-based Android malware detection system using feature selection based on linear regression.
- Published in:
- Neural Computing & Applications, 2023, v. 35, n. 7, p. 4903, doi. 10.1007/s00521-021-05875-1
- By:
- Publication type:
- Article
A new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 16, p. 17859, doi. 10.1007/s11227-023-05251-x
- By:
- Publication type:
- Article
Sparse polynomial multiplication for lattice-based cryptography with small complexity.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 2, p. 438, doi. 10.1007/s11227-015-1570-1
- By:
- Publication type:
- Article
On the generalisation of special moduli for faster interleaved montgomery modular multiplication.
- Published in:
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 3, p. 165, doi. 10.1049/iet-ifs.2010.0271
- By:
- Publication type:
- Article
Password-Based SIMSec Protocol.
- Published in:
- Dicle University Journal of Engineering / Dicle Üniversitesi Mühendislik Dergisi, 2020, v. 11, n. 3, p. 1021, doi. 10.24012/dumf.753942
- By:
- Publication type:
- Article
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2020, v. 28, n. 1, p. 275, doi. 10.3906/elk-1906-151
- By:
- Publication type:
- Article
Taxonomy of traffic engineering mechanisms in software-defined networks: a survey.
- Published in:
- Telecommunication Systems, 2022, v. 81, n. 3, p. 475, doi. 10.1007/s11235-022-00947-6
- By:
- Publication type:
- Article
JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES.
- Published in:
- Journal of Modern Technology & Engineering, 2020, v. 5, n. 1, p. 5
- By:
- Publication type:
- Article
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection.
- Published in:
- Advances in Data Science & Adaptive Analysis, 2021, v. 13, n. 3/4, p. 1, doi. 10.1142/S2424922X21410011
- By:
- Publication type:
- Article
IoT Güvenliği için Kullanılan Makine Öğrenimi ve Derin Öğrenme Modelleri Üzerine Bir Derleme.
- Published in:
- International Journal of InformaticsTechnologies, 2021, v. 14, n. 4, p. 457, doi. 10.17671/gazibtd.976591
- By:
- Publication type:
- Article
Generating binary diffusion layers with maximum/high branch numbers and low search complexity.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3558, doi. 10.1002/sec.1561
- By:
- Publication type:
- Article
New methods for public key cryptosystems based on XTR.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3682, doi. 10.1002/sec.1291
- By:
- Publication type:
- Article
A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications.
- Published in:
- Journal of Circuits, Systems & Computers, 2017, v. 26, n. 10, p. -1, doi. 10.1142/S0218126617501560
- By:
- Publication type:
- Article