Found: 12
Select item for more details and to access through your institution.
Multi-BSM: An Anomaly Detection and Position Falsification Attack Mitigation Approach in Connected Vehicles.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 20, p. 3282, doi. 10.3390/electronics11203282
- By:
- Publication type:
- Article
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT).
- Published in:
- Journal of Cloud Computing (2192-113X), 2022, v. 11, n. 1, p. 1, doi. 10.1186/s13677-022-00345-y
- By:
- Publication type:
- Article
Trajectory Design for UAV-Based Data Collection Using Clustering Model in Smart Farming.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 1, p. 37, doi. 10.3390/s22010037
- By:
- Publication type:
- Article
.Ethical Hacking in Information Security Curricula.
- Published in:
- International Journal of Information & Communication Technology Education, 2016, v. 12, n. 1, p. 1, doi. 10.4018/IJICTE.2016010101
- By:
- Publication type:
- Article
A Fog Computing Framework for Intrusion Detection of Energy-Based Attacks on UAV-Assisted Smart Farming.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 6, p. 3857, doi. 10.3390/app13063857
- By:
- Publication type:
- Article
Flexible Global Aggregation and Dynamic Client Selection for Federated Learning in Internet of Vehicles.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 2, p. 1739, doi. 10.32604/cmc.2023.043684
- By:
- Publication type:
- Article
Dynamic rule and rule‐field optimisation for improving firewall performance and security.
- Published in:
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 4, p. 250, doi. 10.1049/iet-ifs.2011.0146
- By:
- Publication type:
- Article
Real-Time Attention Monitoring System for Classroom: A Deep Learning Approach for Student's Behavior Recognition.
- Published in:
- Big Data & Cognitive Computing, 2023, v. 7, n. 1, p. 48, doi. 10.3390/bdcc7010048
- By:
- Publication type:
- Article
Towards more reliable and secure source routing in mobile ad hoc and sensor networks.
- Published in:
- Telecommunication Systems, 2014, v. 55, n. 1, p. 81, doi. 10.1007/s11235-013-9753-7
- By:
- Publication type:
- Article
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.
- Published in:
- Journal of Intelligent Systems, 2015, v. 24, n. 2, p. 199, doi. 10.1515/jisys-2014-0049
- By:
- Publication type:
- Article
Architectures and Strategies for Efficient Communication in Wireless Sensor Networks Using Unmanned Aerial Vehicles.
- Published in:
- Unmanned Systems, 2016, v. 4, n. 4, p. 289, doi. 10.1142/S2301385016500126
- By:
- Publication type:
- Article
Updating snort with a customized controller to thwart port scanning.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 8, p. 807, doi. 10.1002/sec.186
- By:
- Publication type:
- Article