Search

Your search keyword '"Pedrycz, Witold"' showing total 658 results

Search Constraints

Start Over You searched for: Author "Pedrycz, Witold" Remove constraint Author: "Pedrycz, Witold" Topic security Remove constraint Topic: security
658 results on '"Pedrycz, Witold"'

Search Results

1. A Survey on Trust Models in Heterogeneous Networks

2. A Study on Network Anomaly Detection Using Stacking-Based Machine Learning Algorithms for ASNM Datasets

3. A Secure Fingerprint Transmission Protocol for Insecure Communication Channels

4. Behavioral Biometrics—A Case Study of Digital Banking Security in Saudi Arabia

5. Advancements and Perspectives in Digital Image Watermarking

6. Developing Efficient Methods for Tracking the Location, Status, and Maintenance Needs of Oxygen Cylinders Equipped with IoT Devices

7. Zero-Knowledge-Proof-Based Protocol Connecting Traditional Finance to Decentralized Finance

8. A Lightweight Group Authentication Framework for Blockchain-Enabled IoT Network in Healthcare Systems

9. Privacy and Security Considerations in Explainable AI

10. Hardware-Based Blockchain Architecture with Physical Unclonable Function for Securing IoT Systems

12. Single Smart Card for Identity and Authentication Using Data Analytics

13. IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security

14. Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support

15. A Review on Security Challenges: Cryptography and Blockchain for Internet of Things

16. Securing Bluetooth Technology in Healthcare: A Comprehensive Case Study and Practical Insights

17. Survey on VANET Authentication Scheme Based on Cryptographic Protocols

18. Violent Activity Detection Through Surveillance Camera Using Deep Learning

19. Privacy Preservation for the IoMT Using Federated Learning and Blockchain Technologies

20. Analysis of eSIM/iSIM for Critical Communications

21. HackMySelf: Decrypting Cookies to Show the Theft of Personal Data in University Students

22. Blockchain-Based Certificate Verification System: A Decentralized Approach

23. SEPA-CRT: SDN Enabled Direction Based Privacy-Preserving Authentication Scheme Using Chinese Remainder Theorem (CRT) for VANET

24. Security Threats and Data Protection Methods Used in Cloud Computing: A Review

26. Improvement Networks Intrusion Detection System Using Artificial Neural Networks (ANN)

27. Building Secure and Decentralized EHR Systems with Blockchain and Smart Contracts

28. Use of Polygram Substitution in Spotting the Swindler in Secret Sharing

29. Security Enhancement Using Blockchain for Internet of Things

30. Enhancing Web Browser Extensions: Preventing JavaScript Code Injection and Vulnerabilities

31. Prediction of Bitcoin Price Using XGBoost Algorithm Along with the Impact of Blockchain Technology

32. Security in Mobile Ad Hoc Networks: Impact of Attacks and Countermeasure Approaches

33. Decision Tree Based Network Intrusion Detection for Cyber Security Application

34. Electronic Voting System Using Blockchain

35. Enhancing Security in Wireless Sensor Networks: A Broadcast/Multicast Authentication Framework with Identity-Based Signature Schemes

36. An MQTT IoT Intrusion Detection System Using Deep-Learning

37. Broken Authentication and Its Significance in Protecting Online Applications: An Overview Paper

38. An Innovative Method for DNA Cryptography-Based Digital Signature Verification

39. Information and Digital Structure of the Economic Security System of Regional Companies

40. Security Challenges and Privacy Issues in IoT Environment: A Systematic Review and Research Directions

41. Attack and Anomaly Detection in IoT Sensors Using Machine Learning Approaches

42. Uses of Blockchain in Internet of Medical Things: A Systematic Review

43. Controlled Operation in Smart Door Using Face Recognition

44. Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations

45. Internet of Things Data Privacy and Security-Based on Blockchain Technology

46. Security Challenges and Solutions in the Development of a Website for Administering a Virtual University

47. Examining the Privacy and Security of Mobile Refugee Applications

48. Investigating Privacy and Security of LinkedIn Via Forensics Analysis

49. Design and Development of a Reliable Blockchain-Based Pension System

50. Challenges of Deepfakes

Catalog

Books, media, physical & digital resources