Works matching IS 17518709 AND DT 2025 AND VI 2025
Results: 10
A Review on Integrating IoT, IIoT, and Industry 4.0: A Pathway to Smart Manufacturing and Digital Transformation.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/9275962
- By:
- Publication type:
- Article
Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/9984635
- By:
- Publication type:
- Article
Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/5523834
- By:
- Publication type:
- Article
BF‐ACS—Intelligent and Immutable Face Recognition Access Control System.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/6755170
- By:
- Publication type:
- Article
Using Homomorphic Proxy Re‐Encryption to Enhance Security and Privacy of Federated Learning‐Based Intelligent Connected Vehicles.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/4632786
- By:
- Publication type:
- Article
Cryptanalysis of Keyword Confidentiality in a Searchable Public‐Key Encryption Scheme Against Malicious Server.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/2464518
- By:
- Publication type:
- Article
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/1655307
- By:
- Publication type:
- Article
Navigating Privacy: A Global Comparative Analysis of Data Protection Laws.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/5536763
- By:
- Publication type:
- Article
A Fast Search Method for 3‐Share Second‐Order Masking Schemes for Lightweight S‐Boxes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/9155041
- By:
- Publication type:
- Article
Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and Challenges.
- Published in:
- IET Information Security (Wiley-Blackwell), 2025, v. 2025, p. 1, doi. 10.1049/ise2/2654550
- By:
- Publication type:
- Article