229 results on '"security models"'
Search Results
2. Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments
3. Analyzing Threats and Attacks in Edge Data Analytics within IoT Environments.
4. A multi-layered security model to counter social engineering attacks: a learning-based approach
5. An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios.
6. Internet of Vehicles: Security and Research Roadmap
7. Administration of Security and Safety in the Schools
8. A Novel Security Framework to Mitigate and Avoid Unexpected Security Threats in Saudi Arabia.
9. The Adversary Capabilities in Practical Byzantine Fault Tolerance
10. Comparative Analysis of Internet of Things (IoT) Security Models
11. Guidelines and Their Challenges in Implementing CSIRT in Ecuador
12. Evaluating the Effectiveness of Metamodeling in Emulating Quantitative Models
13. A review of models for transport security and of their relevance for supply chains.
14. On the Relation Between Security Models for HB-like Symmetric Key Authentication Protocols
15. Security Testing of Internet of Things for Smart City Applications: A Formal Approach
16. Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models Through a Stacked Ensemble of Metamodels
17. A Comprehensive Analysis on Numerous Learning Models for Intrusion Detection for Security Conservation.
18. An adaptable Intelligence Algorithm to a Cybersecurity Framework for IIOT.
19. Sustainable and Security Focused Multimodal Models for Distance Learning.
20. Assessment of Different Security Issues, Threats with Their Detection and Prevention Security Models in Mobile Cloud Computing (MCC)
21. On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy
22. Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
23. 5G Security: Concepts and Challenges
24. A Chronological Review of Key Establishment Models and Protocols.
25. Towards a Model-Based Testing Framework for the Security of Internet of Things for Smart City Applications
26. Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions
27. Security Aspects and Models in Cooperative Production Processes
28. Virtual IoT HoneyNets to Mitigate Cyberattacks in SDN/NFV-Enabled IoT Networks.
29. On the leakage-resilient key exchange
30. Post-Quantum Security Models for Authenticated Encryption
31. Hierarchical Joint CNN-Based Models for Fine-Grained Cars Recognition
32. Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
33. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange
34. Security Modeling and Analysis of a SDN Based Web Service
35. Analysis of Model Clark Wilson to Adopt to the Database of the Civil Registry of Ecuador
36. Security Notions for Bidirectional Channels
37. SoK: Security Models for Pseudo-Random Number Generators
38. The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
39. Continuous After-the-Fact Leakage-Resilient Key Exchange
40. Networks Security models Scalability Analysis.
41. Combined image encryption and steganography technique for enhanced security using multiple chaotic maps.
42. Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
43. From Selective-ID to Full-ID IBS without Random Oracles
44. Quantum Key Distribution in the Classical Authenticated Key Exchange Framework
45. On the Feasibility of Malware Attacks in Smartphone Platforms
46. Integrity-Organization Based Access Control for Critical Infrastructure Systems
47. On the (Non-)Equivalence of UC Security Notions
48. Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal
49. A Formal Equivalence Classes Based Method for Security Policy Conformance Checking
50. THE T2ROL ACCESS CONTROL MODEL FOR MOBILE HEALTH SYSTEMS IN DEVELOPING COUNTRIES.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.