A Study of Anti-Phising Methodologies and Phishing Detection Algorithms
|
2019 |
Cerda, Beatrice M. |
Semantic Knowledge Architecture for Cyber Security
|
2019 |
Sayan, Carla |
Cross-Platform Malware: Study of the Forthcoming Hazard Adaptation and Behavior
|
2019 |
Zahran, Bassam |
Toward a Quantum Resistant SecretMatch Privacy Enhanced Technology - A Case Study
|
2019 |
Horne, Dwight |
Chaining JSON Blocks for Secure Transmission of Mobile Data Sequences
|
2019 |
Yoon, John |
Blockchain based IoT node Authentication in WSNs
|
2019 |
Hong, Sunghyuck |
An Efficient Private Matching and Set Intersection Protocol: Implementation PM-Malicious Server
|
2019 |
Saldamli, Gokay |
Smart Voting Keys to e-Democracy
|
2019 |
Wolfe, Andrew |
Survey on Shilling Attacks and their Detection Algorithms in Recommender Systems
|
2019 |
Badran, Miriam El Khoury |
Feature-level Data Fusion for Bio-metric Mobile Applications. A case study
|
2019 |
Soviany, Sorin |
Design Techniques of the S-Box in AES Cryptosystem - A Review and Performance Comparison
|
2019 |
Abd-El-Barr, Mostafa |
VKE: a Visual Analytics Tool for CyberSecurity Data
|
2019 |
Gonzalez-Torres, Antonio |
Identity Management via Blockchain
|
2019 |
Saldamli, Gokay |
Misuse Intrusion Detection using Machine Learning for Gas Pipeline SCADA Networks
|
2019 |
Khan, Ehsan Al Zaki |
GPU-Accelerated Randomized Newton Method for Fast Training Malicious Web Site Classifier
|
2019 |
Lu, Yuechao |
PortableVN: A Generic Mobile Application for Network Security Testbeds
|
2019 |
Pujari, Medha |
Protecting the Unmanned Aerial Vehicle from Cyberattacks
|
2019 |
Nunez, Jesus |
Vehicle Routing Optimization for Humanitarian Logistics in Disaster Recovery: A Survey
|
2019 |
Annuar, Wadi Khalid |
A Protocol for Service to Service Authentication using Token Challenge Response
|
2019 |
Kewalramani, Hiresha |
Mobile App-Browser Extension Based Authentication
|
2019 |
Desai, Ritwik |