Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions Tyagi, Himani

2 p.
artikel
2 An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis Zeufack, Vannel

2 p.
artikel
3 A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues Lone, Kalimullah

2 p.
artikel
4 A simplified scheme for secure offline electronic payment systems Kutubi, Md. Abdullah Al Rahat

2 p.
artikel
5 A survey on blockchain systems: Attacks, defenses, and privacy preservation Chen, Yourong

2 p.
artikel
6 A survey on security analysis of machine learning-oriented hardware and software intellectual property Tauhid, Ashraful

2 p.
artikel
7 A trapdoor one-way function for verifiable secret sharing Kanso, Ali

2 p.
artikel
8 A trusted architecture for EV shared charging based on blockchain technology He, Yunhua

2 p.
artikel
9 Attribute-based keyword search encryption for power data protection Zhang, Xun

2 p.
artikel
10 CSRF protection in JavaScript frameworks and the security of JavaScript applications Peguero, Ksenia

2 p.
artikel
11 Data-driven approach to designing a BCI-integrated smart wheelchair through cost–benefit analysis Badajena, Jenamani Chandrakanta

2 p.
artikel
12 Decentralizing access control system for data sharing in smart grid Liu, Kunpeng

2 p.
artikel
13 Design high-confidence computers using trusted instructional set architecture and emulators Wang, Shuangbao (Paul)

2 p.
artikel
14 Differentially private data publication with multi‐level data utility Jiang, Honglu

2 p.
artikel
15 DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection Zhang, Weiqi

2 p.
artikel
16 Editorial Board
2 p.
artikel
17 Electrolint and security of electron applications Peguero, Ksenia

2 p.
artikel
18 Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM Aiyshwariya Devi, R.

2 p.
artikel
19 Erratum regarding missing statements in previously published articles
2 p.
artikel
20 Features selection and prediction for IoT attacks Su, Jingyi

2 p.
artikel
21 Informer: Irregular traffic detection for containerized microservices RPC in the real world Chen, Jiyu

2 p.
artikel
22 Lightweight key distribution for secured and energy efficient communication in wireless sensor network: An optimization assisted model P., Ezhil Roja

2 p.
artikel
23 PRAP-PIM: A weight pattern reusing aware pruning method for ReRAM-based PIM DNN accelerators Shen, Zhaoyan

2 p.
artikel
24 Search geometric ranges efficiently as keywords over encrypted spatial data Guo, Ruoyang

2 p.
artikel
25 When blockchain meets smart grids: A comprehensive survey Guo, Yihao

2 p.
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland