28 results on '"El-Hajj, Mohammed"'
Search Results
2. NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce
3. Automobile insurance fraud detection using data mining: A systematic literature review
4. Predictive Modeling of Customer Response to Marketing Campaigns.
5. Leveraging Digital Twins and Intrusion Detection Systems for Enhanced Security in IoT-Based Smart City Infrastructures.
6. ProtectingSmall and Medium Enterprises: A Specialized Cybersecurity Risk Assessment Framework and Tool.
7. Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0.
8. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems
9. Systematic Literature Review: Digital Twins’ Role in Enhancing Security for Industry 4.0 Applications
10. A taxonomy of PUF Schemes with a novel Arbiter-based PUF resisting machine learning attacks
11. Evaluating the Efficiency of zk-SNARK, zk-STARK, and Bulletproof in Real-World Scenarios: A Benchmark Study.
12. Systematic Review: Comparing zk-SNARK, zk-STARK, and Bulletproof Protocols for Privacy-Preserving Authentication
13. Securing IoT Device Networks: A Digital Twin and Automated Adversary Emulation Approach
14. A Comparison of Authentication Protocols for Unified Client Applications
15. An end-to-end Approach to a Reinforcement Learning in Transport Logistics
16. Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
17. Defeating MageCart Attacks in a NAISS Way
18. Security Aspects of Digital Twins in IoT
19. Securing Networks of IoT Devices With Digital Twins and Automated Adversary Emulation
20. A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature
21. Performance analysis of Signcryption and Sign-then-Encrypt schemes for resource-constrained IoT devices
22. Comparative Analysis between the Fast and Basic Scalar Multiplication Used in Elliptic Curve Cryptography
23. Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms
24. Thèse de Doctorat New Authentication Scheme for IoT Systems
25. A Survey of Internet of Things (IoT) Authentication Schemes
26. Taxonomy of authentication techniques in Internet of Things (IoT)
27. Analysis of authentication techniques in Internet of Things (IoT)
28. Bi-Directional Constraint Pushing in Frequent Pattern Mining
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.