Search

Your search keyword '"Asma Adnane"' showing total 41 results

Search Constraints

Start Over You searched for: Author "Asma Adnane" Remove constraint Author: "Asma Adnane"
41 results on '"Asma Adnane"'

Search Results

1. Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection

2. A Review of Service Selection Strategies in Mobile IoT Networks

3. The case of HyperLedger Fabric as a blockchain solution for healthcare applications

4. TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks

5. Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

20. Real-time implementation of a chaos based cryptosystem on low-cost hardware

21. DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection

22. MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles

23. Impact of Silent Periods on Pseudonym Schemes

24. A Delay Sensitive Bus-based Routing Technique for Urban Vehicular Networks

25. TEAM: A Trust Evaluation and Management Framework in Context-Enabled Vehicular Ad-Hoc Networks

26. Trust Management in Vehicular Ad-Hoc Networks and Internet-of-Vehicles

27. On the Design, Development and Implementation of Trust Evaluation Mechanism in Vehicular Networks

28. Internet of Vehicles Over Named Data Networking: Current Status and Future Challenges

29. A Comparative Analysis of Trust Models for Safety Applications in IoT-enabled Vehicular Networks

30. Blockchain in Internet-of-Things: Architecture, Applications and Research Directions

31. The case of HyperLedger Fabric as a blockchain solution for healthcare applications

32. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges

33. Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies

34. A Systematic Approach for Cyber Security in Vehicular Networks

35. A Novel Context-Based Risk Assessment Approach in Vehicular Networks

36. On the Vulnerabilities and Protections of the OLSR ad hoc Routing Protocol from the point of view of Trust

37. Vehicular Cloud Networks: Architecture, Applications and Security Issues

38. Privacy and Trust in Smart Camera Sensor Networks

39. Vehicular Cloud Networks: Architecture and Security

Catalog

Books, media, physical & digital resources