18 results on '"El-Hajj, Mohammed"'
Search Results
2. NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce
3. Systematic Literature Review: Digital Twins’ Role in Enhancing Security for Industry 4.0 Applications
4. Automobile Insurance Fraud Detection Using Data Mining: A Systematic Literature Review
5. Systematic Review: Comparing zk-SNARK, zk-STARK, and Bulletproof Protocols for Privacy-Preserving Authentication
6. Securing IoT Device Networks: A Digital Twin and Automated Adversary Emulation Approach
7. A Comparison of Authentication Protocols for Unified Client Applications
8. An end-to-end Approach to a Reinforcement Learning in Transport Logistics
9. Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
10. Defeating MageCart Attacks in a NAISS Way
11. Security Aspects of Digital Twins in IoT
12. Securing Networks of IoT Devices With Digital Twins and Automated Adversary Emulation
13. Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms
14. A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks
15. A Survey of Internet of Things (IoT) Authentication Schemes
16. Taxonomy of authentication techniques in Internet of Things (IoT)
17. Analysis of authentication techniques in Internet of Things (IoT)
18. Bi-Directional Constraint Pushing in Frequent Pattern Mining
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.