234 results on '"Rao, Udai Pratap"'
Search Results
2. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
3. DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment
4. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
5. Twitter Sentiment Analysis Using Different Machine Learning Techniques
6. Deep Learning-Based Solution for Intrusion Detection in the Internet of Things
7. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
8. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
9. Exploring security and trust mechanisms in online social networks: An extensive review
10. Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare
11. Secrecy aware key management scheme for Internet of Healthcare Things
12. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths
13. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
14. Decentralized Blockchain-Based Framework for Securing Review System
15. White-Box Encryption Scheme for Resource-Constrained IoT Devices
16. Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
17. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
18. A novel trust prediction approach for online social networks based on multifaceted feature similarity
19. Investigating and Devising Privacy Preserving Approaches for Location-Based Services
20. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs)
21. An Interaction-Based and Graph-Based Hybrid Approach to Evaluate Trust in Online Social Networks (OSNs)
22. ElGamal Homomorphic Encryption-Based Privacy Preserving Association Rule Mining on Horizontally Partitioned Healthcare Data
23. Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices
24. An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
25. User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks
26. EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things
27. Context-Aware Computing for IoT: History, Applications and Research Challenges
28. Document Management System Empowered by Effective Amalgam of Blockchain and IPFS
29. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case
30. White-Box Encryption Scheme for Resource-Constrained IoT Devices
31. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
32. Investigating and Devising Privacy Preserving Approaches for Location-Based Services
33. Decentralized Blockchain-Based Framework for Securing Review System
34. Decentralised Ecosystem for Journalism based on Blockchain
35. Preserving Location Privacy Using Blockchain
36. Blockchain for Information Security and Privacy
37. A New Ecosystem for Digital Identity Verification Using Blockchain
38. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining
39. SCC-LBS: Secure Criss-Cross Location-Based Service in Logistics
40. Towards Privacy-Preserving Dummy Generation in Location-Based Services
41. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
42. A Novel approach as Multi-place Watermarking for Security in Database
43. Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study
44. Scalable l-Diversity
45. Preserving location privacy using three layer RDV masking in geocoded published discrete point data
46. Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
47. Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location-Based Services Enabled Mobiles
48. A review on cloud security issues and solutions
49. Decentralised Ecosystem for Journalism based on Blockchain
50. Preserving Location Privacy Using Blockchain
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.