Found: 10
Select item for more details and to access through your institution.
Foundations and Practice of Security in Emerging ICT Applications.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 69
- By:
- Publication type:
- Article
Detecting local covert channels using process activity correlation on android smartphones.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 71
- By:
- Publication type:
- Article
k-out-of-n Oblivious transfer protocol with security against malicious adversaries.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 81
- By:
- Publication type:
- Article
A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 93
- By:
- Publication type:
- Article
Enhanced TKTOFT protocol for ternary tree based distributed group key management in cognitive radio networks.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 103
- By:
- Publication type:
- Article
Security threats in M2M networks: A survey with case study.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 117
- By:
- Publication type:
- Article
Fast backup and recovery for web protection using trigger and block hash approach.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 137
- By:
- Publication type:
- Article
An extensive empirical evaluation of classifier ensembles for intrusion detection task.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 149
- By:
- Publication type:
- Article
Achieving a scalable and secure software defined network by identifiers separating and mapping.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 159
- By:
- Publication type:
- Article
Abnormal behavior pattern mining for unknown threat detection.
- Published in:
- Computer Systems Science & Engineering, 2017, v. 32, n. 2, p. 171
- By:
- Publication type:
- Article