Found: 27
Select item for more details and to access through your institution.
A secure mHealth application for attention deficit and hyperactivity disorder.
- Published in:
- Expert Systems, 2020, v. 37, n. 1, p. N.PAG, doi. 10.1111/exsy.12431
- By:
- Publication type:
- Article
Self-organizing life cycle management of mobile ad hoc networks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 10, p. 1147, doi. 10.1002/sec.513
- By:
- Publication type:
- Article
Decision Support System Based on Indoor Location for Personnel Management.
- Published in:
- 2021
- By:
- Publication type:
- Letter
New Attack Strategy for the Shrinking Generator.
- Published in:
- Journal of Research & Practice in Information Technology, 2009, v. 41, n. 2, p. 181
- By:
- Publication type:
- Article
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences.
- Published in:
- Journal of Research & Practice in Information Technology, 2008, v. 40, n. 4, p. 255
- By:
- Publication type:
- Article
Detection of malicious URLs using machine learning.
- Published in:
- Wireless Networks (10220038), 2024, v. 30, n. 9, p. 7543, doi. 10.1007/s11276-024-03700-w
- By:
- Publication type:
- Article
Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks.
- Published in:
- Wireless Networks (10220038), 2023, v. 29, n. 8, p. 3781, doi. 10.1007/s11276-023-03438-x
- By:
- Publication type:
- Article
Self-Organized Clustering Architecture for Vehicular Ad Hoc Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/384869
- By:
- Publication type:
- Article
Countermeasures to avoid noncooperation in fully self-organized VANETs.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/589563
- By:
- Publication type:
- Article
Driver Identification and Detection of Drowsiness while Driving.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 6, p. 2603, doi. 10.3390/app14062603
- By:
- Publication type:
- Article
Novel Guidance CPS Based on the FatBeacon Protocol.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 4, p. 647, doi. 10.3390/app8040647
- By:
- Publication type:
- Article
La ciberseguridad necesita mujeres y las mujeres necesitan ciberseguridad.
- Published in:
- Revista Iberoamericana de Ciencia, Tecnologia y Sociedad, 2024, v. 19, n. 56, p. 101, doi. 10.52712/issn.1850-0013-553
- By:
- Publication type:
- Article
Ethereum-based decentralized car rental system.
- Published in:
- Logic Journal of the IGPL, 2022, v. 30, n. 6, p. 926, doi. 10.1093/jigpal/jzac003
- By:
- Publication type:
- Article
Detection of forest fires outbreaks by dynamic fuzzy logic controller.
- Published in:
- Logic Journal of the IGPL, 2021, v. 29, n. 6, p. 936, doi. 10.1093/jigpal/jzaa036
- By:
- Publication type:
- Article
Merging sub-networks in VANETs by using the IEEE 802.11xx protocols.
- Published in:
- Peer-to-Peer Networking & Applications, 2015, v. 8, n. 4, p. 664, doi. 10.1007/s12083-014-0313-z
- By:
- Publication type:
- Article
Using blockchain in the follow‐up of emergency situations related to events.
- Published in:
- Software: Practice & Experience, 2021, v. 51, n. 10, p. 2000, doi. 10.1002/spe.2779
- By:
- Publication type:
- Article
A secure approach to monitoring emergency health resources.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2021, v. 2021, n. 1, p. 1, doi. 10.1186/s13638-021-02077-0
- By:
- Publication type:
- Article
Secure UAV-Based System to Detect Small Boats Using Neural Networks.
- Published in:
- Complexity, 2019, p. 1, doi. 10.1155/2019/7206096
- By:
- Publication type:
- Article
Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks.
- Published in:
- Complexity, 2018, p. 1, doi. 10.1155/2018/1639715
- By:
- Publication type:
- Article
A cryptological way of teaching mathematics.
- Published in:
- Teaching Mathematics & its Applications, 2007, v. 26, n. 1, p. 2, doi. 10.1093/teamat/hrl008
- By:
- Publication type:
- Article
An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 7, p. 1562, doi. 10.3390/s17071562
- By:
- Publication type:
- Article
Implementation and Analysis of Real-Time Streaming Protocols.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 4, p. 846, doi. 10.3390/s17040846
- By:
- Publication type:
- Article
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 4, p. 733, doi. 10.3390/s17040733
- By:
- Publication type:
- Article
Trust-Based Cooperative Social System Applied to a Carpooling Platform for Smartphones.
- Published in:
- Sensors (14248220), 2017, v. 17, n. 2, p. 245, doi. 10.3390/s17020245
- By:
- Publication type:
- Article
Cellular Automata-Based Application for Driver Assistance in Indoor Parking Areas.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 11, p. 1921, doi. 10.3390/s16111921
- By:
- Publication type:
- Article
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
- Published in:
- Sensors (14248220), 2016, v. 16, n. 1, p. 75, doi. 10.3390/s16010075
- By:
- Publication type:
- Article