Your selections:
Robust malware defense in industrial IoT applications using machine learning with selective adversarial samples
- Khoda, Mahbub, Imam, Tasadduq, Kamruzzaman, Joarder, Gondal, Iqbal, Rahman, Ashfaqur
The rise of ransomware and emerging security challenges in the internet of things
- Yaqoob, Ibrar, Ahmed, Ejaz, Rehman, Muhammad, Ahmed, Abdelmuttlib, Imran, Muhammad
Alignment-free fingerprint template protection technique based on minutiae neighbourhood information
- Nazmul, Rumana, Islam, Rafiqul, Chowdhury, Ahsan
A robust forgery detection method for copy-move and splicing attacks in images
- Islam, Mohammad, Karmakar, Gour, Kamruzzaman, Joarder, Murshed, Manzur
On network security and internet vulnerability
- Miller, Mirka, Patel, Deval, Patel, Keyurkumar
Preserving the confidentiality of digital images using a chaotic encryption scheme
- Jolfaei, Alireza, Matinfar, Ahmadreza, Mirghadri, Abdolrasoul
Energy sector development : system dynamics analysis
- Laimon, Mohamd, Mai, Thanh, Goh, Steven, Yusaf, Talal
Static code analysis of data-driven applications through common lingua and the Semantic Web technologies
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Jan, Mian, Cai, Jinjin, Gao, Xiang-Chuan, Khan, Fazlullah, Mastorakis, Spyridon, Usman, Muhammad, Alazab, Mamoun, Watters, Paul
International student security : A view from Beijing
- Forbes-Mewett, Helen, Nyland, Christopher, Shao, Sijun
Countering stasistical attacks in cloud-based searchable encryption
- Ahsan, M., Ali, Ihsan, Bin Idris, Mohd, Imran, Muhammad, Shoaib, Muhammad
- Patel, Keyurkumar, McCubben, Steve
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
An IIoT-Based Networked Industrial Control System Architecture to Secure Industrial Applications
Forensic identification and detection of hidden and obfuscated malware
- Usman, Muhammad, Jan, Mian, Jolfaei, Alireza, Xu, Min, He, Xiangjian, Chen, Jinjun
Bio-inspired network security for 5G-enabled IoT applications
- Saleem, Kashif, Alabduljabbar, Ghadah, Alrowais, Nouf, Al-Muhtadi, Jalal, Imran, Muhammad, Rodrigues, Joel
A secured framework for SDN-based edge computing in IoT-enabled healthcare system
- Li, Junxia, Cai, Jinjin, Khan, Fazlullah, Rehman, Ateeq, Balasubramanian, Venki
A blockchain-based privacy-preserving mechanism with aggregator as common communication point
- Yahaya, Adamu, Javaid, Nadeem, Khalid, Rabiya, Imran, Muhammad, Guizani, Mohsen
Formal modeling and verification of a blockchain-based crowdsourcing consensus protocol
- Afzaal, Hamra, Imran, Muhammad, Janjua, Muhammad, Gochhayat, Sarada
Are you sure you would like to clear your session, including search history and login status?