Search

Showing total 761 results
761 results

Search Results

1. Ethereum Smart Contract Vulnerability Detection and Machine Learning-Driven Solutions: A Systematic Literature Review.

2. Integrity and Privacy Assurance Framework for Remote Healthcare Monitoring Based on IoT.

3. A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems.

4. A Deep Learning-Based Method for Preventing Data Leakage in Electric Power Industrial Internet of Things Business Data Interactions.

5. Enhancing Visual Data Security: A Novel FSM-Based Image Encryption and Decryption Methodology.

6. Trustworthiness of Situational Awareness: Significance and Quantification.

7. Hierarchical-Based Dynamic Scenario-Adaptive Risk Assessment for Power Data Lifecycle.

8. Secure Control of Linear Controllers Using Fully Homomorphic Encryption.

9. Trust Management Scheme of IoV Based on Dynamic Sharding Blockchain †.

10. An IHPO-WNN-Based Federated Learning System for Area-Wide Power Load Forecasting Considering Data Security Protection.

11. A Holistic Review of Cyber–Physical–Social Systems: New Directions and Opportunities.

12. Linguistic Methods of Image Division for Visual Data Security.

13. Development of Security Rules and Mechanisms to Protect Data from Assaults.

14. Real-Time Monitoring and Management of Hardware and Software Resources in Heterogeneous Computer Networks through an Integrated System Architecture.

15. Robust Soliton Distribution-Based Zero-Watermarking for Semi-Structured Power Data.

16. Towards Blockchain-Integrated Enterprise Resource Planning: A Pre-Implementation Guide.

17. Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers.

18. A Novel Fragmented Approach for Securing Medical Health Records in Multimodal Medical Images.

19. Reversible Data Hiding in Crypto-Space Images with Polynomial Secret Sharing over Galois Field.

20. An Effective Mechanism for FOG Computing Assisted Function Based on Trustworthy Forwarding Scheme (IOT).

21. Blockchain-Based Caching Architecture for DApp Data Security and Delivery.

22. Intelligent Threat Detection—AI-Driven Analysis of Honeypot Data to Counter Cyber Threats.

23. A Secure Data Aggregation Algorithm Based on a Trust Mechanism.

24. Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks.

25. Enhancing Steganography through Optimized Quantization Tables.

26. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.

27. Lattice-Based Revocable Certificateless Public Key Encryption for Team Score Orienteering.

28. Efficient Data Management in Agricultural IoT: Compression, Security, and MQTT Protocol Analysis.

29. A Usable Encryption Solution for File-Based Geospatial Data within a Database File System.

30. An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure.

31. Sensor-Based Wearable Systems for Monitoring Human Motion and Posture: A Review.

32. Deep Learning-Based Efficient Analysis for Encrypted Traffic.

33. Strengthening Privacy and Data Security in Biomedical Microelectromechanical Systems by IoT Communication Security and Protection in Smart Healthcare.

34. Survey on Blockchain-Based Data Storage Security for Android Mobile Applications.

35. Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques.

36. Raising the Standard of Maritime Voyage Data Recorder Security.

37. Process Authentication through Blockchain: Three Case Studies.

38. Blockchain Interoperability in Data Exchange Logistics Integration.

39. Inter-Channel Correlation Modeling and Improved Skewed Histogram Shifting for Reversible Data Hiding in Color Images.

40. Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks.

41. On the Evaluation Framework of Comprehensive Trust for Data Interaction in Intermodal Transport.

42. A Blockchain-Based Secure Sharing Scheme for Electrical Impedance Tomography Data.

43. A Formal Model for Reliable Data Acquisition and Control in Legacy Critical Infrastructures.

44. Railway Cloud: Management and Orchestration Functionality Designed as Microservices.

45. Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy.

46. Traceable Attribute-Based Encryption Scheme Using BIM Collaborative Design.

47. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

48. Feature-Fusion-Based Abnormal-Behavior-Detection Method in Virtualization Environment.

49. A Blockchain-Based Shared Bus Service Scheduling and Management System.

50. Securing Non-Terrestrial FSO Link with Public Key Encryption against Flying Object Attacks.