Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme
|
2021 |
Shuaib, Mohammed |
Multi-factor Authentication for an Administrator's Devices in an IoT Environment
|
2021 |
Aldarwish, Abdulla J. Y. |
A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption
|
2021 |
Abdulbaqi, Azmi Shawkat |
A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System
|
2021 |
Jafar, Uzma |
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction
|
2021 |
Chimeleze, Collins Uchenna |
Rule-Based SLAAC Attack Detection Mechanism
|
2021 |
Omar, Nazrool |
Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review
|
2021 |
Gana, Usman Mohammed |
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions
|
2021 |
Jaber, Aws Naser |
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets
|
2021 |
Jaber, Aws Naser |
Ensemble-Based Logistic Model Trees for Website Phishing Detection
|
2021 |
Adeyemo, Victor E. |
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks
|
2021 |
Al-shareeda, Mahmood A. |
A Labeled Transactions-Based Dataset on the Ethereum Network
|
2021 |
Al-E'mari, Salam |
DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector
|
2021 |
Farukee, Minhaz Bin |
Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions
|
2021 |
Pahlevanzadeh, Bahareh |
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study
|
2021 |
Taylor, Sarah K. |
Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network
|
2021 |
Ghaleb, Sanaa A. A. |
Static Ransomware Analysis Using Machine Learning and Deep Learning Models
|
2021 |
Gaur, Kartikeya |
Finger Vein Presentation Attack Detection with Optimized LBP Variants
|
2021 |
Lee, W. Q. Janie |
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud
|
2021 |
Aun, Yichiet |
Study of Container-Based Virtualisation and Threats in Fog Computing
|
2021 |
Mahadevappa, Poornima |