Search

Your search keyword '"Centre for Distributed Computing, Networking and Security"' showing total 32 results

Search Constraints

Start Over You searched for: Descriptor "Centre for Distributed Computing, Networking and Security" Remove constraint Descriptor: "Centre for Distributed Computing, Networking and Security" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
32 results on '"Centre for Distributed Computing, Networking and Security"'

Search Results

1. A novel time-slotted LoRa MAC protocol for scalable IoT networks

2. Toward machine intelligence that learns to fingerprint polymorphic worms in IoT

3. A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading

4. Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks

5. A mobility aware duty cycling and preambling solution for wireless sensor network with mobile sink node

6. Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication

7. Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges

8. Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

9. An authentication protocol based on chaos and zero knowledge proof

10. Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: A Queueing Networks Approach

11. SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application

12. A Forensic Audit of the Tor Browser Bundle

13. Interference graphs to monitor and control schedules in low-power WPAN

14. A novel nomad migration-inspired algorithm for global optimization

15. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

16. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

17. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

18. Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

19. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

20. An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0

21. Impact of cyberattacks on stock performance: a comparative study

22. Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset

23. Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network

24. A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks

25. Privacy-Preserving Passive DNS

26. Evaluation of live forensic techniques in ransomware attack mitigation

27. Decrypting live SSH traffic in virtual environments

28. Scenario-based creation and digital investigation of ethereum ERC20 tokens

29. Self-learning power control in wireless sensor networks

30. The Future Internet: A World of Secret Shares

31. Distance Measurement Methods for Improved Insider Threat Detection

32. An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework

Catalog

Books, media, physical & digital resources