214 results on '"Rao, Udai Pratap"'
Search Results
2. DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment
3. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
4. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
5. Twitter Sentiment Analysis Using Different Machine Learning Techniques
6. Deep Learning-Based Solution for Intrusion Detection in the Internet of Things
7. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
8. Exploring security and trust mechanisms in online social networks: An extensive review
9. Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare
10. Secrecy aware key management scheme for Internet of Healthcare Things
11. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
12. Decentralized Blockchain-Based Framework for Securing Review System
13. White-Box Encryption Scheme for Resource-Constrained IoT Devices
14. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
15. A novel trust prediction approach for online social networks based on multifaceted feature similarity
16. Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
17. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs)
18. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
19. Investigating and Devising Privacy Preserving Approaches for Location-Based Services
20. An Interaction-Based and Graph-Based Hybrid Approach to Evaluate Trust in Online Social Networks (OSNs)
21. ElGamal Homomorphic Encryption-Based Privacy Preserving Association Rule Mining on Horizontally Partitioned Healthcare Data
22. An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
23. Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
24. User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks
25. Context-Aware Computing for IoT: History, Applications and Research Challenges
26. Document Management System Empowered by Effective Amalgam of Blockchain and IPFS
27. EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
28. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case
29. Decentralised Ecosystem for Journalism based on Blockchain
30. Preserving Location Privacy Using Blockchain
31. White-Box Encryption Scheme for Resource-Constrained IoT Devices
32. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
33. Investigating and Devising Privacy Preserving Approaches for Location-Based Services
34. Decentralized Blockchain-Based Framework for Securing Review System
35. Blockchain for Information Security and Privacy
36. A New Ecosystem for Digital Identity Verification Using Blockchain
37. SCC-LBS: Secure Criss-Cross Location-Based Service in Logistics
38. Towards Privacy-Preserving Dummy Generation in Location-Based Services
39. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining
40. Preserving location privacy using three layer RDV masking in geocoded published discrete point data
41. Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
42. Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location-Based Services Enabled Mobiles
43. Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study
44. Scalable l-Diversity
45. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
46. Decentralised Ecosystem for Journalism based on Blockchain
47. Preserving Location Privacy Using Blockchain
48. VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services
49. A review on cloud security issues and solutions
50. Security Attacks and it’s Countermeasures on Smart Grid: A Review
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.