Evading Static and Dynamic Android Malware Detection Mechanisms
|
2021 |
John, Teenu S. |
A Survey of Security Attacks on Silicon Based Weak PUF Architectures
|
2021 |
Yehoshuva, Chintala |
Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm
|
2021 |
Odeski, Ilia |
Performance Study of Multi-target Tracking Using Kalman Filter and Hungarian Algorithm
|
2021 |
Kumar, N. P. Arun |
Deep Hierarchical App Recommendation with Dynamic Behaviors
|
2021 |
Qu, Taiguo |
Multilevel Secure Container Deployment Framework in Edge Computing
|
2021 |
Nambiar, Seema |
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments
|
2021 |
Huang, Jheng-Jia |
Thermal Management in Large Data Centres: Security Threats and Mitigation
|
2021 |
Saridou, Betty |
GIDS: Anomaly Detection Using Generative Adversarial Networks
|
2021 |
Macwan, Rinoy |
The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications
|
2021 |
Kalapodi, Angeliki |
A Communication-Induced Checkpointing Algorithm for Consistent- Transaction in Distributed Database Systems
|
2021 |
Mansouri, Houssem |
New Security Architecture of Access Control in SG MEC
|
2021 |
Kotulski, Zbigniew |
Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning
|
2021 |
Olowononi, Felix O. |
Benchmarking Behavior-Based Intrusion Detection Systems with Bio-inspired Algorithms
|
2021 |
Ferreira, Paulo |
Audio Steganography Using Multi LSB and IGS Techniques
|
2021 |
Kuchinad, Chinmay D. |
A Forensic Analysis on the Availability of MQTT Network Traffic
|
2021 |
Chunduri, Naga Venkata Hrushikesh |
Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment
|
2021 |
Saiprudhvi, Vangara |
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
|
2021 |
Jiang, Hetong |
On the Feasibility of DoS Attack on Smart Door Lock IoT Network
|
2021 |
Asad, Belal |
Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption Over Outsourced Encrypted Data
|
2021 |
Ahmed, Md Asrar |