376 results on '"Zulkernine, Mohammad"'
Search Results
2. Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence
3. Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware
4. Multi-layer stacking ensemble learners for low footprint network intrusion detection
5. TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks
6. Classification-Based Anomaly Prediction in XACML Policies
7. Security assessment of in-vehicle communication protocols
8. TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks
9. AIM: An Android Interpretable Malware detector based on application class modeling
10. DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure
11. Mining Attribute-Based Access Control Policies
12. Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3
13. Policy Modeling and Anomaly Detection in ABAC Policies
14. AVSDA: Autonomous Vehicle Security Decay Assessment
15. A Dynamic Threat Prevention Framework for Autonomous Vehicle Networks based on Ruin-theoretic Security Risk Assessment
16. Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory
17. A coalitional security game against data integrity attacks in autonomous vehicle networks
18. CamoDroid: An Android application analysis environment resilient against sandbox evasion
19. Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs
20. VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.
21. DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure
22. Mining Attribute-Based Access Control Policies
23. Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3
24. LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network
25. WPA3 Connection Deprivation Attacks
26. RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware
27. A secure architecture for TCP/UDP-based cloud communications
28. A classification of attacks to In-Vehicle Components (IVCs)
29. Graphene: A Secure Cloud Communication Architecture
30. Connection Dumping Vulnerability Affecting Bluetooth Availability
31. NESec: A Modified-UI Honeyword Generation Strategy for Mitigating Targeted Guessing Attacks
32. A Taxonomy of Security as a Service
33. Offering security diagnosis as a service for cloud SaaS applications
34. Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis.
35. Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security.
36. Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security
37. Autonomous and Security-Aware Dynamic Vehicular Platoon Formation
38. The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense
39. Defending Application Cache Integrity of Android Runtime
40. Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts
41. Detecting DNS Tunneling Using Ensemble Learning
42. Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis
43. Countermeasures for Mitigating ICN Routing Related DDoS Attacks
44. FPGuard: Detection and Prevention of Browser Fingerprinting
45. TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks
46. Attacks in Public Clouds: Can They Hinder the Rise of the Cloud?
47. SAS-GKE: A Secure Authenticated Scalable Group Key Exchange
48. AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles
49. A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus
50. SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.