Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             16 results found
no title author magazine year volume issue page(s) type
1 Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain Ghorbel, Amal

21 3 p. 489-508
article
2 A content-based deep intrusion detection system Soltani, Mahdi

21 3 p. 547-562
article
3 Anomalous behavior detection-based approach for authenticating smart home system users Amraoui, Noureddine

21 3 p. 611-636
article
4 A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces Zhang, Lu

21 3 p. 509-525
article
5 Data space randomization for securing cyber-physical systems Potteiger, Bradley

21 3 p. 597-610
article
6 Defeating traffic analysis via differential privacy: a case study on streaming traffic Zhang, Xiaokuan

21 3 p. 689-706
article
7 Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture Bhattacharjya, Sairath

21 3 p. 427-436
article
8 Evaluating differentially private decision tree model over model inversion attack Park, Cheolhee

21 3 p. 1-14
article
9 Gossamer: weaknesses and performance D’Arco, P.

21 3 p. 669-687
article
10 Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology Singh, Jaya

21 3 p. 527-546
article
11 Maintaining the level of operational effectiveness of a CSOC under adverse conditions Shah, Ankit

21 3 p. 637-651
article
12 Narrow privacy and desynchronization in Vaudenay’s RFID model Ţiplea, Ferucio Laurenţiu

21 3 p. 563-575
article
13 Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud Alghamdi, Saleh A.

21 3 p. 469-488
article
14 Pragmatic authenticated key agreement for IEEE Std 802.15.6 Khan, Haibat

21 3 p. 577-595
article
15 Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures Spence, Aaron

21 3 p. 437-453
article
16 Tracking adoption of revocation and cryptographic features in X.509 certificates Zulfiqar, Maryam

21 3 p. 653-668
article
                             16 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands