Found: 12
Select item for more details and to access through your institution.
A systematic literature review on wearable health data publishing under differential privacy.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 847, doi. 10.1007/s10207-021-00576-1
- By:
- Publication type:
- Article
MAPAS: a practical deep learning-based android malware detection system.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 725, doi. 10.1007/s10207-022-00579-6
- By:
- Publication type:
- Article
Scalable, password-based and threshold authentication for smart homes.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 707, doi. 10.1007/s10207-022-00578-7
- By:
- Publication type:
- Article
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 1, doi. 10.1007/s10207-021-00577-0
- By:
- Publication type:
- Article
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 917, doi. 10.1007/s10207-022-00588-5
- By:
- Publication type:
- Article
Challenges of post-quantum digital signing in real-world applications: a survey.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 937, doi. 10.1007/s10207-022-00587-6
- By:
- Publication type:
- Article
A multi-objective cost–benefit optimization algorithm for network hardening.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 813, doi. 10.1007/s10207-022-00586-7
- By:
- Publication type:
- Article
Coin-based Secure Computations.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 833, doi. 10.1007/s10207-022-00585-8
- By:
- Publication type:
- Article
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 799, doi. 10.1007/s10207-022-00584-9
- By:
- Publication type:
- Article
Developing non-interactive MPC with trusted hardware for enhanced security.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 777, doi. 10.1007/s10207-022-00583-w
- By:
- Publication type:
- Article
A survey on analyzing encrypted network traffic of mobile devices.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 873, doi. 10.1007/s10207-022-00581-y
- By:
- Publication type:
- Article
A first look at references from the dark to the surface web world: a case study in Tor.
- Published in:
- International Journal of Information Security, 2022, v. 21, n. 4, p. 739, doi. 10.1007/s10207-022-00580-z
- By:
- Publication type:
- Article