Search

Your search keyword '"Buchanan, William J."' showing total 433 results

Search Constraints

Start Over You searched for: Author "Buchanan, William J." Remove constraint Author: "Buchanan, William J."
433 results on '"Buchanan, William J."'

Search Results

401. A framework for live host-based Bitcoin wallet forensic triage

402. A Comparative Analysis of Honeypots on Different Cloud Platforms.

403. MY COUSIN BRONC.

404. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

405. Decentralized accessibility of e-commerce products through blockchain technology.

406. A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.

407. LETTERS.

408. Evaluation of binary decision diagrams for redundancy, shadowing, generalisation and correlation in an Information sharing model

409. A novel Information sharing model using binary decision diagrams for redundancy, shadowing, generalisation and correlation

410. RC2 Encryption and Decryption in Microsoft .NET

411. Interagency data exchange, privacy protection and governance architecture for Information sharing across domains

412. Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing

413. Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

414. Embedded document security using sticky policies and identity based encryption

415. RESCUE : evaluation of a fragmented secret share system in distributed-cloud architecture

416. Attacking Windows Hello for Business: Is It What We Were Promised?

417. Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

418. Analysis of electromagnetic wave propagation using 3D finite-difference time-domain methods with parallel processing

420. The Perfect Squelch.

421. Heart data analysis, modelling and application in risk assessment

422. Correlation of affiliate performance against web evaluation metrics

423. Cryptographic privacy-preserving enhancement method for investigative data acquisition

424. Rate based IPS for DDoS

425. Forensic verification of operating system activity via novel data, acquisition and analysis techniques

426. Network firewall dynamic performance evaluation and formalisation

427. Enhanced educational framework for networking

428. MARIAN : a hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks

429. An agent-based Bayesian method for network intrusion detection

431. Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection.

432. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture.

433. BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond.

Catalog

Books, media, physical & digital resources