Search

Your search keyword '"Buchanan, William J."' showing total 40 results

Search Constraints

Start Over You searched for: Author "Buchanan, William J." Remove constraint Author: "Buchanan, William J." Database Complementary Index Remove constraint Database: Complementary Index
40 results on '"Buchanan, William J."'

Search Results

1. Female Rat Behavior Effects from Low Levels of Hexavalent Chromium (Cr[VI]) in Drinking Water Evaluated with a Toxic Aging Coin Approach.

2. Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

3. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder.

4. Attacking Windows Hello for Business: Is It What We Were Promised?

5. Using Social Media & Sentiment Analysis to Make Investment Decisions.

6. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations.

7. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification.

8. Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

9. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

10. A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions.

11. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.

12. Energy demand forecasting of buildings using random neural networks.

13. Scenario-based creation and digital investigation of ethereum ERC20 tokens.

14. An authentication protocol based on chaos and zero knowledge proof.

16. Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study.

17. Distance Measurement Methods for Improved Insider Threat Detection.

18. Letters.

23. The Future Internet: A World of Secret Shares.

26. HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles.

27. Ransomware: Analysing the Impact on Windows Active Directory Domain Services.

29. Browsers' Private Mode: Is It What We Were Promised?

30. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT.

31. A Comparative Analysis of Honeypots on Different Cloud Platforms.

32. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks.

33. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

34. Privacy-Preserving Passive DNS.

35. Evaluation of live forensic techniques in ransomware attack mitigation.

36. A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.

37. Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication.

39. LETTERS.

Catalog

Books, media, physical & digital resources