Found: 9
Select item for more details and to access through your institution.
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices.
- Published in:
- CMES-Computer Modeling in Engineering & Sciences, 2024, v. 140, n. 2, p. 1669, doi. 10.32604/cmes.2024.047239
- By:
- Publication type:
- Article
FIT: Design and Implementation of Fast ID Tracking System on Chip for Vehicular Ad-hoc Networks.
- Published in:
- Wireless Personal Communications, 2022, v. 124, n. 2, p. 1645, doi. 10.1007/s11277-021-09424-w
- By:
- Publication type:
- Article
Cooperative Friendly Jamming Techniques for Drone-Based Mobile Secure Zone.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 3, p. 865, doi. 10.3390/s22030865
- By:
- Publication type:
- Article
Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 2, p. 579, doi. 10.3390/s22020579
- By:
- Publication type:
- Article
Fast Packet Inspection for End-To-End Encryption.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 11, p. 1937, doi. 10.3390/electronics9111937
- By:
- Publication type:
- Article
Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things.
- Published in:
- Wireless Personal Communications, 2020, v. 114, n. 1, p. 295, doi. 10.1007/s11277-020-07364-5
- By:
- Publication type:
- Article
Battery Draining Attack and Defense against Power Saving Wireless LAN Devices.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 7, p. 2043, doi. 10.3390/s20072043
- By:
- Publication type:
- Article
Scalable and Secure Internet of Things Connectivity.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 7, p. 752, doi. 10.3390/electronics8070752
- By:
- Publication type:
- Article
Secure Inter-Frame Space Communications for Wireless LANs.
- Published in:
- Future Internet, 2018, v. 10, n. 6, p. 47, doi. 10.3390/fi10060047
- By:
- Publication type:
- Article