Search

Your search keyword '"Centre for Distributed Computing, Networking and Security"' showing total 95 results

Search Constraints

Start Over You searched for: Descriptor "Centre for Distributed Computing, Networking and Security" Remove constraint Descriptor: "Centre for Distributed Computing, Networking and Security" Topic business Remove constraint Topic: business
95 results on '"Centre for Distributed Computing, Networking and Security"'

Search Results

1. A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading

2. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

3. A mobility aware duty cycling and preambling solution for wireless sensor network with mobile sink node

4. Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges

5. Hybrid tree-rule firewall for high speed data transmission

6. Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks

7. Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

8. Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks

9. Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System

10. A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

11. An authentication protocol based on chaos and zero knowledge proof

12. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

13. KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data

14. FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment

15. FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks

16. Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

17. Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: A Queueing Networks Approach

18. IoT Forensics: Amazon Echo as a Use Case

19. SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application

20. A Forensic Audit of the Tor Browser Bundle

21. Interference graphs to monitor and control schedules in low-power WPAN

22. Secure Lightweight Stream Data Outsourcing for Internet of Things

23. A Comparative Analysis of Honeypots on Different Cloud Platforms

24. Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection

25. Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment

26. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

27. Privacy and Trust Redefined in Federated Machine Learning

28. A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

29. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

30. Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks

31. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

32. FRCA: A Novel Flexible Routing Computing Approach for Wireless Sensor Networks

33. Decentralized Accessibility of e-commerce Products through Blockchain Technology

34. Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

35. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

36. Double-Arc Parallel Coordinates and its Axes re-Ordering Methods

37. A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model

38. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption

39. Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting

40. CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

41. ARCA-IoT: An Attack-Resilient Cloud-Assisted IoT System

42. Analyzing Objective and Subjective Data in Social Sciences: Implications for Smart Cities

43. MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features

44. An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0

45. Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

46. Impact of cyberattacks on stock performance: a comparative study

47. MOSAIC: Simultaneous Localization and Environment Mapping Using mmWave Without A-Priori Knowledge

48. A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment

49. Wireless Body Area Network (WBAN)

50. On Privacy Aware Carriers for Value-Possessed e-Invoices Considering Intelligence Mining

Catalog

Books, media, physical & digital resources