Works matching IS 17518709 AND DT 2020 AND VI 14 AND IP 4
Results: 12
Cloud‐assisted secure and conjunctive publish/subscribe service in smart grids.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 470, doi. 10.1049/iet-ifs.2019.0086
- By:
- Publication type:
- Article
Scan‐based attack tolerance with minimum testability loss: a gate‐level approach.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 459, doi. 10.1049/iet-ifs.2019.0444
- By:
- Publication type:
- Article
Novel LDoS attack detection by Spark‐assisted correlation analysis approach in wireless sensor network.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 452, doi. 10.1049/iet-ifs.2018.5512
- By:
- Publication type:
- Article
Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 443, doi. 10.1049/iet-ifs.2019.0559
- By:
- Publication type:
- Article
Algebraic method to recover superpolies in cube attacks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 430, doi. 10.1049/iet-ifs.2019.0323
- By:
- Publication type:
- Article
Malware classification using compact image features and multiclass support vector machines.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 419, doi. 10.1049/iet-ifs.2019.0189
- By:
- Publication type:
- Article
Security analysis of KAP based on enhanced MPF.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 410, doi. 10.1049/iet-ifs.2019.0333
- By:
- Publication type:
- Article
Detection of compromised accounts for online social networks based on a supervised analytical hierarchy process.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 401, doi. 10.1049/iet-ifs.2018.5286
- By:
- Publication type:
- Article
Privacy preservation with RTT‐based detection for wireless mesh networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 391, doi. 10.1049/iet-ifs.2019.0492
- By:
- Publication type:
- Article
Lightweight and privacy‐preserving authentication scheme with the resilience of desynchronisation attacks for WBANs.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 380, doi. 10.1049/iet-ifs.2019.0491
- By:
- Publication type:
- Article
IoT security vulnerabilities and predictive signal jamming attack analysis in LoRaWAN.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 368, doi. 10.1049/iet-ifs.2019.0447
- By:
- Publication type:
- Article
Guest Editorial: Security on Mobile and IoT Devices.
- Published in:
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 4, p. 367, doi. 10.1049/iet-ifs.2020.0270
- Publication type:
- Article