1,575 results
Search Results
2. Big Data Analytics for Secure Edge-Based Manufacturing Internet of Things (MIoT)
3. The Ticket Price Matters in Sharding Blockchain
4. Council of Europe Guidelines on the Use of ICT in Electoral Processes
5. Threat Sensitive Networking: On the Security of IEEE 802.1CB and (un)Effectiveness of Existing Security Solutions
6. SLIME: State Learning in the Middle of Everything for Tool-Assisted Vulnerability Detection
7. Influencing Factors for Users’ Privacy and Security Protection Behavior in Smart Speakers: Insights from a Swiss User Study
8. Intelligent Target Cell Selection Algorithm for Low Latency 5G Networks
9. Not All Code are Create2 Equal
10. Microservices Security: Bad vs. Good Practices
11. Tool-Based Attack Graph Estimation and Scenario Analysis for Software Architectures
12. Testing and Verifying the Security of COVID-19 CT Images Deep Learning System with Adversarial Attack
13. The Effects of the Russo-Ukrainian War on Network Infrastructures Through the Lens of BGP
14. Product Incremental Security Risk Assessment Using DevSecOps Practices
15. Solutions for Protecting the Space Ground Segments: From Risk Assessment to Emergency Response
16. Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles
17. Towards Comprehensive Modeling of CPSs to Discover and Study Interdependencies
18. Metasploit for Cyber-Physical Security Testing with Real-Time Constraints
19. Software Framework of Context-Aware Reconfigurable Secure Smart Grids
20. Application of IoT in 5G Wireless Communication: A Detailed Review
21. Coping with Changing Contexts: A Healthcare Security Perspective
22. Building Information Modelling Supporting Safety and Security Threats Management: A Literature Review
23. Navigating the Blockchain Trilemma: A Supply Chain Dilemma
24. Security Concerns and Citizens’ Privacy Implications in Smart Multimedia Applications
25. Design of End-To-End Security for MQTT 5.0
26. Secure and Transparent Supply Chain Management to Prevent Counterfeit Drugs
27. Enhancing Security Mechanism in Smart Phones Using Crowdsourcing
28. Medical Cyber-Physical Systems Enabled with Permissioned Blockchain
29. Sandbox Environment for Real Time Malware Analysis of IoT Devices
30. Energy, QoS and Security Aware Edge Services
31. Audit and Analysis of Docker Tools for Vulnerability Detection and Tasks Execution in Secure Environment
32. Policy Modeling and Anomaly Detection in ABAC Policies
33. Usable Privacy and Security from the Perspective of Cognitive Abilities
34. Usability Analysis for Blockchain-Based Applications
35. Generalized Net Model of Biometric Multifactor Authentication System
36. Data Breach in Social Networks Using Machine Learning
37. An Intrusion Detection System for Blackhole Attack Detection and Isolation in RPL Based IoT Using ANN
38. Security- and Privacy-Aware IoT Application Placement and User Assignment
39. Rethinking the Limits of Mobile Operating System Permissions
40. State Based IoT Security for Tamper Prevention
41. JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating
42. Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
43. Secure Software Development: Infuse Cyber Security to Mitigate Attacks in an Organization
44. Suborn Channels: Incentives Against Timelock Bribes
45. A Secure User-Centred Healthcare System: Design and Verification
46. ADAM: Automatic Detection of Android Malware
47. Towards Immediate Feedback for Security Relevant Code in Development Environments
48. Quantifying Nodes Trustworthiness Using Hybrid Approach for Secure Routing in Mobile Ad Hoc Networks
49. A Secure Communication Gateway with Parity Generator Implementation in QCA Platform
50. Novel Hybrid Technique Enhancing Data Privacy and Security
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.