![]() HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks (V. Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study (Mohiuddin Ahmed, Al-Sakib Khan Pathan).Pages 211-219īVD - A Blockchain Based Vehicle Database System (S. El-Alfy, Sadam Al-Azani).Pages 157-167Ī Participatory Privacy Protection Framework for Smart-Phone Application Default Settings (Haroon Elahi, Guojun Wang).Pages 168-182ĭesigning a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution (Chris Drake, Praveen Gauravaram).Pages 183-210 Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets (El-Sayed M. Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains (Michael Grabatin, Wolfgang Hommel, Michael Steinke).Pages 145-156 Workload Distribution for Supporting Anonymous Communications in Automotive Network (Mehran Alidoost Nia, Antonio Ruiz-Martínez).Pages 132-144 Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol (Kamel Saddiki, Sofiane Boukli-Hacene, Marc Gilg, Pascal Lorenz).Pages 117-131 Proof of Stack Consensus for Blockchain Networks (Anjani Barhanpure, Paaras Belandor, Bhaskarjyoti Das).Pages 104-116 Managing Network Functions in Stateful Application Aware SDN (Prabhakar Krishnan, Krishnashree Achuthan).Pages 88-103 Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments (R. Mehtre).Pages 53-66Ĭost Based Model for Secure Health Care Data Retrieval (Kritika Kumari, Sayantani Saha, Sarmistha Neogy).Pages 67-75 Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks (Ghanshyam S. ![]() Survey on Prevention, Mitigation and Containment of Ransomware Attacks (Sumith Maniath, Prabaharan Poornachandran, V. Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update (R. A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks (Gemini George, Sabu M. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |