30 results on '"Ko, Ryan K L"'
Search Results
2. Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
3. Computing Mod with a Variable Lookup Table
4. Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT Ecosystem
5. An Edge-Cloud Collaborative Object Detection System
6. Smart Search over Encrypted Educational Resources in Cloud Storage
7. PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone Networks
8. A Robust Malware Detection Approach for Android System Based on Ensemble Learning
9. A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes
10. Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social Media
11. Active Malicious Accounts Detection with Multimodal Fusion Machine Learning Algorithm
12. Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated Learning
13. Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing Environment
14. An Online Automated Anti-anti-virus Method
15. A Fine-Tuning Strategy Based on Real Scenes in Gait Identification
16. A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power Terminals
17. Towards Evaluating the Effectiveness of Botnet Detection Techniques
18. A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 Dataset
19. Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS)
20. A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN
21. Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN Networks
22. A Backdoor Embedding Method for Backdoor Detection in Deep Neural Networks
23. Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks
24. Skill Reward for Safe Deep Reinforcement Learning
25. A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
26. Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System
27. Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids
28. Reliable and Controllable Data Sharing Based on Blockchain
29. Privacy-Preserving Cluster Validity
30. Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area Network
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.