Search

Showing total 462 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Topic security Remove constraint Topic: security Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Journal ieee access Remove constraint Journal: ieee access
462 results

Search Results

1. A Systematic Review on Blockchain-Enabled Internet of Vehicles (BIoV): Challenges, Defenses, and Future Research Directions

2. A Comparative Study of Lightweight Machine Learning Techniques for Cyber-Attacks Detection in Blockchain-Enabled Industrial Supply Chain

3. Secure and Scalable Blockchain-Based Federated Learning for Cryptocurrency Fraud Detection: A Systematic Review

4. A Study on Markov-Based Password Strength Meters

5. Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space

6. Security of 6G-Enabled Vehicle-to-Everything Communication in Emerging Federated Learning and Blockchain Technologies

7. Detecting IP DDoS Attacks Using 3GPP Radio Protocols

8. Blockchain in the Electronics Industry for Supply Chain Management: A Survey

9. A Survey on Vehicular Cloud Network Security

10. Automated Generation of 5G Fine-Grained Threat Models: A Systematic Approach

11. A Survey on IoT Driven Smart Parking Management System: Approaches, Limitations and Future Research Agenda

12. A Survey on DNA-Based Cryptography and Steganography

13. Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective

14. Implementation and Evaluation of a Smart Uplink Jamming Attack in a Public 5G Network

15. Fortifying the Blockchain: A Systematic Review and Classification of Post-Quantum Consensus Solutions for Enhanced Security and Resilience

16. Privacy-Preserving Detection of Power Theft in Smart Grid Change and Transmit (CAT) Advanced Metering Infrastructure

17. 5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance

18. Security Threats to 5G Networks for Social Robots in Public Spaces: A Survey

19. Open-RAN Fronthaul Transport Security Architecture and Implementation

20. Privacy-Preserving and Security in SDN-Based IoT: A Survey

21. Toward Secured IoT-Based Smart Systems Using Machine Learning

22. A Review on Digital Twin Technology in Smart Grid, Transportation System and Smart City: Challenges and Future

23. Cyber Security Controls in Nuclear Power Plant by Technical Assessment Methodology

24. Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems

25. The Next Generation of eHealth: A Multidisciplinary Survey

26. A Survey: To Govern, Protect, and Detect Security Principles on Internet of Medical Things (IoMT)

27. Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks

28. An Adversarial Perspective on Accuracy, Robustness, Fairness, and Privacy: Multilateral-Tradeoffs in Trustworthy ML

29. An Extensive Blockchain Based Applications Survey: Tools, Frameworks, Opportunities, Challenges and Solutions

30. Channel Impulse Response Multilevel Quantization for Power Line Communications

31. Blockchain Technology for Secure Supply Chain Management: A Comprehensive Review

32. Blockchain-Based Supply Chain Information Sharing Mechanism

33. Blockchain and AI-Empowered Healthcare Insurance Fraud Detection: an Analysis, Architecture, and Future Prospects

34. Big Data Privacy and Security Using Abundant Data Recovery Techniques and Data Obliviousness Methodologies

35. Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks

36. Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks

37. Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks

38. Lightweight Cryptographic Hash Functions: Design Trends, Comparative Study, and Future Directions

39. Analysis of Blockchain Solutions for E-Voting: A Systematic Literature Review

40. 5G Early Data Transmission (Rel-16): Security Review and Open Issues

41. Power System Reliability and Maintenance Evolution: A Critical Review and Future Perspectives

42. Machine Learning for Cloud Security: A Systematic Review

43. Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies

44. A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

45. Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application

46. LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

47. A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification

48. Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network

49. A Survey on Privacy-Preserving Authentication Schemes in VANETs: Attacks, Challenges and Open Issues

50. A Survey of IoT and Blockchain Integration: Security Perspective