33 results on '"Yichiet, Aun"'
Search Results
2. Group Key Management in Internet of Things: A Systematic Literature Review.
3. Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques.
4. Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions.
5. FeaST: Feature-guided Style Transfer for high-fidelity art synthesis.
6. A Machine-Learning Ensemble Method for Temporal-aware Sales Forecasting.
7. A Machine-Learning Pipeline for Semantic-Aware and Contexts-Rich Video Description Method.
8. A semantic-aware log generation method for network activities
9. A holistic IoT device classification approach through spatial & temporal behaviors modelling.
10. Two-Factor Human Authentication for Mobile Applications
11. Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud.
12. Intent-Based Network Policy to Solution Architecting Recommendations.
13. Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing.
14. Two-Factor Human Authentication for Mobile Applications
15. Pervasive Internet of Things (IoT) for Smart Speakers Discovery and Playback Continuity
16. Social Engineering Attack Classifications on Social Media Using Deep燣earning
17. Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions.
18. Adaptive Polling Rate for SNMP for Detecting Elusive DDOS
19. A Recurrent Neural Network based Method for Low-Rate DDoS Attack Detection in SDN
20. A Review on Features’ Robustness in High Diversity Mobile Traffic Classifications
21. Indoor Positioning System: A Review
22. IoT Wireless Intrusion Detection and Network Traffic Analysis
23. Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
24. Automated Information Security Awareness Profiling Framework of Malaysian
25. Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud
26. A semantic-aware log generation method for network activities
27. Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing
28. Keystroke Dynamics in Mobile Platform
29. A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification
30. Keystroke Dynamics in Mobile Platform.
31. Dynamic assignment of Ipv6 addresses with embedded server role information for unified services and devices discovery
32. A Universal Server Discovery Method for Generic Server Indexing
33. Evaluating Activity Recognition Diversity as Readiness Measure Towards Mainstream Applicability
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.