Search

Your search keyword '"security models"' showing total 229 results

Search Constraints

Start Over You searched for: Descriptor "security models" Remove constraint Descriptor: "security models"
229 results on '"security models"'

Search Results

1. IoT Security Monitoring Tools and Models

2. Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments

3. Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments.

5. An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.

8. A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia.

9. The Adversary Capabilities in Practical Byzantine Fault Tolerance

10. Comparative Analysis of Internet of Things (IoT) Security Models

11. Guidelines and Their Challenges in Implementing CSIRT in Ecuador

12. Evaluating the Effectiveness of Metamodeling in Emulating Quantitative Models

13. A review of models for transport security and of their relevance for supply chains.

16. Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models Through a Stacked Ensemble of Metamodels

17. A Comprehensive Analysis on Numerous Learning Models for Intrusion Detection for Security Conservation.

18. An adaptable Intelligence Algorithm to a Cybersecurity Framework for IIOT.

19. Sustainable and Security Focused Multimodal Models for Distance Learning.

20. Assessment of Different Security Issues, Threats with Their Detection and Prevention Security Models in Mobile Cloud Computing (MCC)

21. On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy

22. Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework

23. 5G Security: Concepts and Challenges

24. A Chronological Review of Key Establishment Models and Protocols.

25. Towards a Model-Based Testing Framework for the Security of Internet of Things for Smart City Applications

27. Security Aspects and Models in Cooperative Production Processes

28. Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks.

29. On the leakage-resilient key exchange

30. Post-Quantum Security Models for Authenticated Encryption

31. Hierarchical Joint CNN-Based Models for Fine-Grained Cars Recognition

32. Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks

33. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange

34. Security Modeling and Analysis of a SDN Based Web Service

36. Security Notions for Bidirectional Channels

37. SoK: Security Models for Pseudo-Random Number Generators

38. The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration

39. Continuous After-the-Fact Leakage-Resilient Key Exchange

40. Networks Security models Scalability Analysis.

41. Combined image encryption and steganography technique for enhanced security using multiple chaotic maps.

43. From Selective-ID to Full-ID IBS without Random Oracles

44. Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

47. On the (Non-)Equivalence of UC Security Notions

48. Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal

49. A Formal Equivalence Classes Based Method for Security Policy Conformance Checking

50. THE T2ROL ACCESS CONTROL MODEL FOR MOBILE HEALTH SYSTEMS IN DEVELOPING COUNTRIES.

Catalog

Books, media, physical & digital resources