Your selections:
Preserving the confidentiality of digital images using a chaotic encryption scheme
- Jolfaei, Alireza, Matinfar, Ahmadreza, Mirghadri, Abdolrasoul
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
- Usman, Muhammad, Jan, Mian, Jolfaei, Alireza, Xu, Min, He, Xiangjian, Chen, Jinjun
Vulnerability modelling for hybrid industrial control system networks
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
Security hardening of implantable cardioverter defibrillators
- Jaffar, Iram, Usman, Muhammad, Jolfaei, Alireza
Security challenges and solutions for 5G HetNet
- Sharma, Aakanksha, Balasubramanian, Venki, Jolfaei, Alireza
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza, IEEE
Vulnerability modelling for hybrid IT systems
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
Are you sure you would like to clear your session, including search history and login status?