264 results on '"Castiglione, Arcangelo"'
Search Results
2. Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management
3. A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption
4. CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation
5. Improving Drone Security in Smart Cities via Lightweight Cryptography
6. A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control
7. Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey
8. IoT-based health monitoring system to handle pandemic diseases using estimated computing
9. Modeling and analysis of port supply chain system based on Fabric blockchain
10. DNS tunnels detection via DNS-images
11. MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning
12. Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation
13. Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis
14. On the File Recovery in Systems Infected by Ransomware
15. A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET)
16. Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities
17. High-precision linearized interpretation for fully connected neural network
18. A two-stage intrusion detection approach for software-defined IoT networks
19. A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment
20. A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement
21. A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks
22. Guest Editorial: IoT‐based secure health monitoring and tracking through estimated computing
23. Securing visual search queries in ubiquitous scenarios empowered by smart personal devices
24. An intrusion detection approach based on improved deep belief network
25. Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation
26. Secure weighted possibilistic c-means algorithm on cloud for clustering big data
27. Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis
28. On the File Recovery in Systems Infected by Ransomware
29. Vulsploit: A Module for Semi-automatic Exploitation of Vulnerabilities
30. A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET)
31. On the protection of consumer genomic data in the Internet of Living Things
32. Building a network embedded FEC protocol by using game theory
33. Quantum technique for access control in cloud computing II: Encryption and key distribution
34. A Systematic Review of Consensus Mechanisms in Blockchain
35. On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
36. Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
37. Secure and reliable data communication in developing regions and rural areas
38. Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness
39. A Secure Distributed Video Surveillance System Based on Portable Devices
40. Robust End Hopping for Secure Satellite Communication in Moving Target Defense
41. On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures
42. Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management
43. Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey
44. Secure and distributed video surveillance via portable devices
45. Privacy-preserving Secure Media Streaming for Multi-user Smart Environments
46. A Cluster-Based Multidimensional Approach for Detecting Attacks on Connected Vehicles
47. Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management.
48. On the undetectability of payloads generated through automatic tools: A human‐oriented approach
49. Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey
50. Securing the internet of vehicles through lightweight block ciphers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.