Search

Your search keyword '"Ilsun You"' showing total 831 results

Search Constraints

Start Over You searched for: Author "Ilsun You" Remove constraint Author: "Ilsun You"
831 results on '"Ilsun You"'

Search Results

1. Mitigating Security Vulnerabilities in 6G Networks: A Comprehensive Analysis of the DMRN Protocol Using SVO Logic and ProVerif

2. 5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy

3. SMDFbs: Specification-Based Misbehavior Detection for False Base Stations

4. Session Management for Security Systems in 5G Standalone Network

5. A Survey of techniques for fine-grained web traffic identification and classification

6. APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System

7. Efficient Computation Offloading in Edge Computing Enabled Smart Home

8. A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything

9. A Smart Collaborative Routing Protocol for Delay Sensitive Applications in Industrial IoT

10. NetFlow Monitoring and Cyberattack Detection Using Deep Learning With Ceph

11. A Predictor-Corrector Algorithm Based on Laurent Series for Biological Signals in the Internet of Medical Things

12. Multi-ECGNet for ECG Arrythmia Multi-Label Classification

13. DMM-SEP: Secure and Efficient Protocol for Distributed Mobility Management Based on 5G Networks

14. A Deep Reinforcement Learning Based Approach for Energy-Efficient Channel Allocation in Satellite Internet of Things

15. Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing

16. Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey

17. Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?

18. IEEE Access Special Section Editorial: Green Communications on Wireless Networks

19. SGF-MD: Behavior Rule Specification-Based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System

20. An Innovative Framework for Dynamic Traffic Lights Management Based on the Combined Use of Fuzzy Logic and Several Network Architectures

21. 5G wireless P2MP backhaul security protocol: an adaptive approach

22. Decentralized Policy Coordination in Mobile Sensing with Consensual Communication

23. Machine Learning Based Signaling DDoS Detection System for 5G Stand Alone Core Network

24. Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption

25. Content Recommendation Algorithm for Intelligent Navigator in Fog Computing Based IoT Environment

26. Secure and Reliable Resource Allocation and Caching in Aerial-Terrestrial Cloud Networks (ATCNs)

27. APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs

28. A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks

29. Low-Power AES Data Encryption Architecture for a LoRaWAN

30. IEEE Access Special Section: Radio Frequency Identification and Security Techniques

31. Active Data Replica Recovery for Quality-Assurance Big Data Analysis in IC-IoT

32. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems

33. A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning

34. A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing

35. Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT)

36. Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET

37. Securing Internet-of-Things Systems Through Implicit and Explicit Reputation Models

38. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments

39. Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols

40. Study and Investigation on 5G Technology: A Systematic Review

42. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks

43. ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT

44. A LDDoS-Aware Energy-Efficient Multipathing Scheme for Mobile Cloud Computing Systems

45. Smart Collaborative Connection Management for Identifier-Based Network

46. Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing

47. SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks

48. A DVFS Based Energy-Efficient Tasks Scheduling in a Data Center

49. IEEE Access Special Section Editorial: Security and Privacy in Applications and Services for Future Internet of Things

50. Toward efficient authentication for space-air-ground integrated Internet of things

Catalog

Books, media, physical & digital resources