Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0
|
2021 |
Kreppein, Alexander |
Blockchain-Based Incentive Mechanism to Combat Fake News
|
2021 |
Farooq, Munaza |
An Implementation of Robust User Authentication Technique for Big Data Platform
|
2021 |
AL-Rummana, Galal A. |
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic
|
2021 |
Hasoon, Jamal N. |
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network
|
2021 |
Arjuman, Navaneethan C. |
Cascade Generalization Based Functional Tree for Website Phishing Detection
|
2021 |
Balogun, Abdullateef O. |
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions
|
2021 |
Keshkeh, Kinan |
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing
|
2021 |
Mahadevappa, Poornima |
Security Issues and Challenges in SDN
|
2021 |
Shamsan, Ali Haider |
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey
|
2021 |
Ahmed, Ibrahim M. |
Analysis of File Carving Approaches: A Literature Review
|
2021 |
Ramli, Nor Ika Shahirah |
A Conceptual Model to Identify Illegal Activities on the Bitcoin System
|
2021 |
Al-Hashedi, Khaled Gubran |
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks
|
2021 |
Alamiedy, Taief Alaa |
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation
|
2021 |
Afzal, Rafia |
Securing Software Defined Networking Using Intrusion Detection System - A Review
|
2021 |
Al-Mi’ani, Noor |
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates
|
2021 |
Masood, Faraz |
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems
|
2021 |
Qassim, Qais Saif |
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain
|
2021 |
Le, Vu |
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review
|
2021 |
Ali, Rao Faizan |
Pluggable Authentication Module Meets Identity-Based Identification
|
2021 |
Chia, Jason |