nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions
|
Tyagi, Himani |
|
|
|
2 |
p. |
artikel |
2 |
An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis
|
Zeufack, Vannel |
|
|
|
2 |
p. |
artikel |
3 |
A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues
|
Lone, Kalimullah |
|
|
|
2 |
p. |
artikel |
4 |
A simplified scheme for secure offline electronic payment systems
|
Kutubi, Md. Abdullah Al Rahat |
|
|
|
2 |
p. |
artikel |
5 |
A survey on blockchain systems: Attacks, defenses, and privacy preservation
|
Chen, Yourong |
|
|
|
2 |
p. |
artikel |
6 |
A survey on security analysis of machine learning-oriented hardware and software intellectual property
|
Tauhid, Ashraful |
|
|
|
2 |
p. |
artikel |
7 |
A trapdoor one-way function for verifiable secret sharing
|
Kanso, Ali |
|
|
|
2 |
p. |
artikel |
8 |
A trusted architecture for EV shared charging based on blockchain technology
|
He, Yunhua |
|
|
|
2 |
p. |
artikel |
9 |
Attribute-based keyword search encryption for power data protection
|
Zhang, Xun |
|
|
|
2 |
p. |
artikel |
10 |
CSRF protection in JavaScript frameworks and the security of JavaScript applications
|
Peguero, Ksenia |
|
|
|
2 |
p. |
artikel |
11 |
Data-driven approach to designing a BCI-integrated smart wheelchair through cost–benefit analysis
|
Badajena, Jenamani Chandrakanta |
|
|
|
2 |
p. |
artikel |
12 |
Decentralizing access control system for data sharing in smart grid
|
Liu, Kunpeng |
|
|
|
2 |
p. |
artikel |
13 |
Design high-confidence computers using trusted instructional set architecture and emulators
|
Wang, Shuangbao (Paul) |
|
|
|
2 |
p. |
artikel |
14 |
Differentially private data publication with multi‐level data utility
|
Jiang, Honglu |
|
|
|
2 |
p. |
artikel |
15 |
DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection
|
Zhang, Weiqi |
|
|
|
2 |
p. |
artikel |
16 |
Editorial Board
|
|
|
|
|
2 |
p. |
artikel |
17 |
Electrolint and security of electron applications
|
Peguero, Ksenia |
|
|
|
2 |
p. |
artikel |
18 |
Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM
|
Aiyshwariya Devi, R. |
|
|
|
2 |
p. |
artikel |
19 |
Erratum regarding missing statements in previously published articles
|
|
|
|
|
2 |
p. |
artikel |
20 |
Features selection and prediction for IoT attacks
|
Su, Jingyi |
|
|
|
2 |
p. |
artikel |
21 |
Informer: Irregular traffic detection for containerized microservices RPC in the real world
|
Chen, Jiyu |
|
|
|
2 |
p. |
artikel |
22 |
Lightweight key distribution for secured and energy efficient communication in wireless sensor network: An optimization assisted model
|
P., Ezhil Roja |
|
|
|
2 |
p. |
artikel |
23 |
PRAP-PIM: A weight pattern reusing aware pruning method for ReRAM-based PIM DNN accelerators
|
Shen, Zhaoyan |
|
|
|
2 |
p. |
artikel |
24 |
Search geometric ranges efficiently as keywords over encrypted spatial data
|
Guo, Ruoyang |
|
|
|
2 |
p. |
artikel |
25 |
When blockchain meets smart grids: A comprehensive survey
|
Guo, Yihao |
|
|
|
2 |
p. |
artikel |