Search

Your search keyword '"Centre for Distributed Computing, Networking and Security"' showing total 204 results

Search Constraints

Start Over You searched for: Descriptor "Centre for Distributed Computing, Networking and Security" Remove constraint Descriptor: "Centre for Distributed Computing, Networking and Security"
204 results on '"Centre for Distributed Computing, Networking and Security"'

Search Results

1. A novel time-slotted LoRa MAC protocol for scalable IoT networks

2. Toward machine intelligence that learns to fingerprint polymorphic worms in IoT

3. A VMD and LSTM based hybrid model of load forecasting for power grid security

4. A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks

5. A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading

6. Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks

7. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

8. A mobility aware duty cycling and preambling solution for wireless sensor network with mobile sink node

9. Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication

10. Ensemble learning-based IDS for sensors telemetry data in IoT networks

11. Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges

12. Hybrid tree-rule firewall for high speed data transmission

13. Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks

14. Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things

15. A new multistage encryption scheme using linear feedback register and chaos-based quantum map

16. Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks

17. NapierOne: A modern mixed file data set alternative to Govdocs1

18. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

19. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

20. Vehicular Computation Offloading for Industrial Mobile Edge Computing

21. Newly Engineered Energy-based Features for Supervised Anomaly Detection in a Physical Model of a Water Supply System

22. A Novel Web Attack Detection System for Internet of Things via Ensemble Classification

23. An authentication protocol based on chaos and zero knowledge proof

24. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

25. KNN-Based Approximate Outlier Detection Algorithm Over IoT Streaming Data

26. FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment

27. FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks

28. Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

29. PTAOD: A Novel Framework for Supporting Approximate Outlier Detection Over Streaming Data for Edge Computing

30. Statistical Assessment of IP Multimedia Subsystem in a Softwarized Environment: A Queueing Networks Approach

31. IoT Forensics: Amazon Echo as a Use Case

32. SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application

33. A Forensic Audit of the Tor Browser Bundle

34. Interference graphs to monitor and control schedules in low-power WPAN

35. Secure Lightweight Stream Data Outsourcing for Internet of Things

36. A Novel Heuristic Data Routing for Urban Vehicular Ad-hoc Networks

37. Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms

38. A Comparative Analysis of Honeypots on Different Cloud Platforms

39. Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection

40. Block-Sparse Coding-Based Machine Learning Approach for Dependable Device-Free Localization in IoT Environment

41. A novel nomad migration-inspired algorithm for global optimization

42. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

43. Evaluation of engagement with hyperlocal e-participation systems by citizens and representatives

44. Privacy and Trust Redefined in Federated Machine Learning

45. A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

46. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

47. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

48. Deep learning based emotion analysis of microblog texts

49. Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks

50. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

Catalog

Books, media, physical & digital resources