Found: 19
Select item for more details and to access through your institution.
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2018, v. 14, n. 11, p. 1, doi. 10.1177/1550147718815046
- By:
- Publication type:
- Article
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 5, p. 1920, doi. 10.3837/tiis.2015.05.021
- By:
- Publication type:
- Article
BFR-SE: A Blockchain-Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine-Grained Access Control in Cloud Environment.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/5340116
- By:
- Publication type:
- Article
An Efficient Approach for LBS Privacy Preservation in Mobile Social Networks.
- Published in:
- Applied Sciences (2076-3417), 2019, v. 9, n. 2, p. 316, doi. 10.3390/app9020316
- By:
- Publication type:
- Article
Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 12, p. 2519, doi. 10.3390/app8122519
- By:
- Publication type:
- Article
A Filter Feature Selection Algorithm Based on Mutual Information for Intrusion Detection.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 9, p. 1535, doi. 10.3390/app8091535
- By:
- Publication type:
- Article
Policy-Based Chameleon Hash with Black-Box Traceability for Redactable Blockchain in IoT.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 7, p. 1646, doi. 10.3390/electronics12071646
- By:
- Publication type:
- Article
A Search Efficient Privacy-Preserving Location-Sharing Scheme in Mobile Online Social Networks.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 23, p. 8402, doi. 10.3390/app10238402
- By:
- Publication type:
- Article
Online Mining Intrusion Patterns from IDS Alerts.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 8, p. 2983, doi. 10.3390/app10082983
- By:
- Publication type:
- Article
Online Intrusion Scenario Discovery and Prediction Based on Hierarchical Temporal Memory (HTM).
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 7, p. 2596, doi. 10.3390/app10072596
- By:
- Publication type:
- Article
DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 2, p. 548, doi. 10.3390/app10020548
- By:
- Publication type:
- Article
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks.
- Published in:
- Journal of Sensors, 2018, p. 1, doi. 10.1155/2018/4396381
- By:
- Publication type:
- Article
Regularity and Green’s relations for finite E-order-preserving transformations semigroups.
- Published in:
- Semigroup Forum, 2010, v. 80, n. 1, p. 164, doi. 10.1007/s00233-009-9192-7
- By:
- Publication type:
- Article
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6658920
- By:
- Publication type:
- Article
Strategy Selection for Moving Target Defense in Incomplete Information Game.
- Published in:
- Computers, Materials & Continua, 2020, v. 62, n. 2, p. 763, doi. 10.32604/cmc.2020.06553
- By:
- Publication type:
- Article
IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.
- Published in:
- KSII Transactions on Internet & Information Systems, 2019, v. 13, n. 10, p. 5058, doi. 10.3837/tiis.2019.10.013
- By:
- Publication type:
- Article
Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.
- Published in:
- PLoS ONE, 2019, v. 14, n. 6, p. 1, doi. 10.1371/journal.pone.0217067
- By:
- Publication type:
- Article
DBSDS: A dual‐blockchain security data sharing model with supervision and privacy‐protection.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 21, p. 1, doi. 10.1002/cpe.7706
- By:
- Publication type:
- Article
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space–Air–Ground Integrated Network.
- Published in:
- Entropy, 2023, v. 25, n. 5, p. 760, doi. 10.3390/e25050760
- By:
- Publication type:
- Article