104 results on '"Aslan, Heba K."'
Search Results
2. New weighted BERT features and multi-CNN models to enhance the performance of MOOC posts classification
3. Attention-based contextual local and global features for urgent posts classification in MOOCs discussion forums
4. Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things
5. A Framework for Democratizing Open-Source Decision-Making using Decentralized Autonomous Organization
6. A Design of a Fast Parallel-Pipelined Implementation of AES: Advanced Encryption Standard
7. Lightweight Computational Complexity Stepping up the NTRU Post-Quantum Algorithm Using Parallel Computing
8. Pseudo Random Number Generators Employing Three Numerical Solvers of Chaotic Generators
9. Attention-based contextual local and global features for urgent posts classification in MOOCs discussion forums
10. Efficient Design for the Implementation of Wong-Lam Multicast Authentication Protocol Using Two-Levels of Parallelism
11. Micro Cloud Services Forensics as a Framework.
12. Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm
13. Lightweight Computational Complexity Stepping Up the NTRU Post-Quantum Algorithm Using Parallel Computing.
14. Stepping up the NTRU-Post Quantum Algorithm Using Parallel Computing
15. A Survey on Parameters Affecting MANET Performance
16. Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
17. A Detection Scheme for the SK Virus
18. Erratum to: Security in the Information Society
19. Cross-Layer Distributed Attack Detection Model for the IoT
20. AUTHMAC_DH: A New Protocol for Authentication and Key Distribution
21. An IoT Privacy-Oriented selective disclosure credential system
22. IoT Modes of Operations with Different Security Key Management Techniques: A Survey
23. Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques.
24. DADEM
25. Erratum to: Security in the Information Society
26. A novel deep learning framework for copy-moveforgery detection in images
27. IoT Privacy-Oriented selective disclosure credential system.
28. AUTHMAC_DH: A New Protocol for Authentication and Key Distribution
29. Two-level controllers hierarchy for a scalable and distributed multicast security protocol
30. A hybrid scheme for multicast authentication over lossy networks
31. A scalable and distributed multicast security protocol using a subgroup-key hierarchy
32. Logical analysis of AUTHMAC_DH: a new protocol for authentication and key distribution
33. A survey of IoT security threats and defenses
34. DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT).
35. Comparative study of copy-move forgery detection techniques
36. Enhanement of elgamal signature scheme using multi-processing system
37. On the security of two improved authenticated encryption schemes
38. An Insight into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions
39. Secure Selective Exclusion in Ad Hoc Wireless Network
40. Secure Component Distribution Using WebCom
41. Information Systems Security and the Information Systems Development Project : Towards a framework for their integration
42. Self-Determination in Mobile Internet PiMI Prototype Results
43. E-Ticket Issuing System with 3-D Pattern Recognition for Mobile Terminals
44. Elliptic Curve Cryptosystems on Smart Cards
45. An Efficient Hybrid Sealed Bid Auction Protocol
46. Establishing Bilateral Anonymous Communication in Open Networks
47. Keystroke Analysis as a Method of Advanced User Authentication and Response
48. Secure Database Connectivity on the WWW
49. BRITS-A Holistic Framework for Hedging Shareholder Value in IT Dependent Business
50. Formal Design of Packet Filtering Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.