Found: 24
Select item for more details and to access through your institution.
IoT Botnet Detection Using Salp Swarm and Ant Lion Hybrid Optimization Model.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 8, p. 1377, doi. 10.3390/sym13081377
- By:
- Publication type:
- Article
S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 4, p. 1436, doi. 10.3837/tiis.2018.04.003
- By:
- Publication type:
- Article
Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 4, p. 1223, doi. 10.3837/tiis.2012.04.016
- By:
- Publication type:
- Article
Logic-Based Security Architecture for Systems Providing Multihop Communication.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/768489
- By:
- Publication type:
- Article
An optical-based encryption and authentication algorithm for color and grayscale medical images.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 15, p. 23735, doi. 10.1007/s11042-022-14093-3
- By:
- Publication type:
- Article
Collaborative Mobile-Learning Architecture Based on Mobile Agents.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 1, p. 162, doi. 10.3390/electronics9010162
- By:
- Publication type:
- Article
Ransomware Detection System for Android Applications.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 8, p. 868, doi. 10.3390/electronics8080868
- By:
- Publication type:
- Article
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 9, p. 4467, doi. 10.3390/s23094467
- By:
- Publication type:
- Article
A Novel Detection and Multi-Classification Approach for IoT-Malware Using Random Forest Voting of Fine-Tuning Convolutional Neural Networks.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 11, p. 4302, doi. 10.3390/s22114302
- By:
- Publication type:
- Article
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 6, p. 2281, doi. 10.3390/s22062281
- By:
- Publication type:
- Article
A Multi-Layer Classification Approach for Intrusion Detection in IoT Networks Based on Deep Learning.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 9, p. 2987, doi. 10.3390/s21092987
- By:
- Publication type:
- Article
Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 5, p. 1375, doi. 10.3390/s20051375
- By:
- Publication type:
- Article
A federated learning framework for cyberattack detection in vehicular sensor networks.
- Published in:
- Complex & Intelligent Systems, 2022, v. 8, n. 5, p. 4221, doi. 10.1007/s40747-022-00705-w
- By:
- Publication type:
- Article
Risk-Based Cybersecurity Compliance Assessment System (RC2AS).
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 10, p. 6145, doi. 10.3390/app13106145
- By:
- Publication type:
- Article
Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 22, p. 10976, doi. 10.3390/app112210976
- By:
- Publication type:
- Article
Visualized Malware Multi-Classification Framework Using Fine-Tuned CNN-Based Transfer Learning Models.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 14, p. 6446, doi. 10.3390/app11146446
- By:
- Publication type:
- Article
A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 7, p. 3022, doi. 10.3390/app11073022
- By:
- Publication type:
- Article
Optimizing Extreme Learning Machines Using Chains of Salps for Efficient Android Ransomware Detection.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 11, p. 3706, doi. 10.3390/app10113706
- By:
- Publication type:
- Article
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 2, p. 3515, doi. 10.32604/cmc.2023.033765
- By:
- Publication type:
- Article
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks.
- Published in:
- Journal of Sensors, 2016, p. 1, doi. 10.1155/2016/4731953
- By:
- Publication type:
- Article
Novel Ransomware Hiding Model Using HEVC Steganography Approach.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 1, p. 1209, doi. 10.32604/cmc.2022.018631
- By:
- Publication type:
- Article
Android malware analysis in a nutshell.
- Published in:
- PLoS ONE, 2022, v. 17, n. 7, p. 1, doi. 10.1371/journal.pone.0270647
- By:
- Publication type:
- Article
A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications.
- Published in:
- Computer Systems Science & Engineering, 2023, v. 46, n. 3, p. 3599, doi. 10.32604/csse.2023.037655
- By:
- Publication type:
- Article
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 977, doi. 10.6688/JISE.201807_34(4).0011
- By:
- Publication type:
- Article