Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             25 results found
no title author magazine year volume issue page(s) type
1 A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions Tyagi, Himani

2 p.
article
2 An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis Zeufack, Vannel

2 p.
article
3 A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues Lone, Kalimullah

2 p.
article
4 A simplified scheme for secure offline electronic payment systems Kutubi, Md. Abdullah Al Rahat

2 p.
article
5 A survey on blockchain systems: Attacks, defenses, and privacy preservation Chen, Yourong

2 p.
article
6 A survey on security analysis of machine learning-oriented hardware and software intellectual property Tauhid, Ashraful

2 p.
article
7 A trapdoor one-way function for verifiable secret sharing Kanso, Ali

2 p.
article
8 A trusted architecture for EV shared charging based on blockchain technology He, Yunhua

2 p.
article
9 Attribute-based keyword search encryption for power data protection Zhang, Xun

2 p.
article
10 CSRF protection in JavaScript frameworks and the security of JavaScript applications Peguero, Ksenia

2 p.
article
11 Data-driven approach to designing a BCI-integrated smart wheelchair through cost–benefit analysis Badajena, Jenamani Chandrakanta

2 p.
article
12 Decentralizing access control system for data sharing in smart grid Liu, Kunpeng

2 p.
article
13 Design high-confidence computers using trusted instructional set architecture and emulators Wang, Shuangbao (Paul)

2 p.
article
14 Differentially private data publication with multi‐level data utility Jiang, Honglu

2 p.
article
15 DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection Zhang, Weiqi

2 p.
article
16 Editorial Board
2 p.
article
17 Electrolint and security of electron applications Peguero, Ksenia

2 p.
article
18 Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM Aiyshwariya Devi, R.

2 p.
article
19 Erratum regarding missing statements in previously published articles
2 p.
article
20 Features selection and prediction for IoT attacks Su, Jingyi

2 p.
article
21 Informer: Irregular traffic detection for containerized microservices RPC in the real world Chen, Jiyu

2 p.
article
22 Lightweight key distribution for secured and energy efficient communication in wireless sensor network: An optimization assisted model P., Ezhil Roja

2 p.
article
23 PRAP-PIM: A weight pattern reusing aware pruning method for ReRAM-based PIM DNN accelerators Shen, Zhaoyan

2 p.
article
24 Search geometric ranges efficiently as keywords over encrypted spatial data Guo, Ruoyang

2 p.
article
25 When blockchain meets smart grids: A comprehensive survey Guo, Yihao

2 p.
article
                             25 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands