Search

Your search keyword '"William J Buchanan"' showing total 42 results

Search Constraints

Start Over You searched for: Author "William J Buchanan" Remove constraint Author: "William J Buchanan" Publisher ieee Remove constraint Publisher: ieee
42 results on '"William J Buchanan"'

Search Results

3. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

4. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

5. Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

6. Towards Continuous User Authentication Using Personalised Touch-Based Behaviour

7. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

8. Trust-based Ecosystem to Combat Fake News

9. A Novel Multi-Chaos Based Compressive Sensing Encryption Technique

10. Requirements for 5G based telemetric cardiac monitoring

11. An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack

12. Performance evaluation of a fragmented secret share system

13. Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention

14. Protecting documents with sticky policies and identity-based encryption

15. HI-risk: A method to analyse health information risk intelligence

16. Sticky policy enabled authenticated OOXML

17. Numerical encoding to Tame SQL injection attacks

18. Secret shares to protect health records in Cloud-based infrastructures

20. A new efficient distributed route discovery for wireless mobile ad hoc networks

21. An Integrated Cloud-based Healthcare Infrastructure

22. DACAR Platform for eHealth Services Cloud

23. Privacy-preserving data acquisition protocol

24. A new adaptive broadcasting approach for mobile ad hoc networks

25. Ad-hoc Routing Metrics and Applied Weighting for QoS support

26. 7th international workshop on Performance Modeling, Evaluation, and Optimization of Ubiquitous Computing and Networked Systems (PMEO-UCNS’08)

27. Investigating False Positive Reduction in HTTP via Procedure Analysis

28. An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing

29. Metric Evaluation of Embedded Java-Based Proxies on Handheld Devices in Cluster-Based Ad Hoc Routing

30. Enhanced methods of coursework provision in computer networks

31. Migration of mobile agents in ad-hoc, wireless networks

32. A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA

33. SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT

34. Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks

35. LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

36. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

37. CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

38. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

39. Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

40. A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect

41. MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features

42. A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks

Catalog

Books, media, physical & digital resources