Pluggable Authentication Module Meets Identity-Based Identification

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACeS (3. : 2021 : George Town, Pinang) Advances in Cyber Security
1. Verfasser: Chia, Jason (VerfasserIn)
Weitere Verfasser: Chin, Ji-Jian (VerfasserIn), Yip, Sook-Chin (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Analysis of File Carving Approaches: A Literature Review 2021 Ramli, Nor Ika Shahirah
A Conceptual Model to Identify Illegal Activities on the Bitcoin System 2021 Al-Hashedi, Khaled Gubran
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks 2021 Alamiedy, Taief Alaa
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation 2021 Afzal, Rafia
Securing Software Defined Networking Using Intrusion Detection System - A Review 2021 Al-Mi’ani, Noor
Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0 2021 Kreppein, Alexander
Blockchain-Based Incentive Mechanism to Combat Fake News 2021 Farooq, Munaza
An Implementation of Robust User Authentication Technique for Big Data Platform 2021 AL-Rummana, Galal A.
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic 2021 Hasoon, Jamal N.
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network 2021 Arjuman, Navaneethan C.
Cascade Generalization Based Functional Tree for Website Phishing Detection 2021 Balogun, Abdullateef O.
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions 2021 Keshkeh, Kinan
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing 2021 Mahadevappa, Poornima
Security Issues and Challenges in SDN 2021 Shamsan, Ali Haider
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey 2021 Ahmed, Ibrahim M.
Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission 2021 Shakir, Haidar Raad
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets 2021 Ward, Gerard
CLH: Approach for Detecting Deep Fake Videos 2021 Hedge, Amrita Shivanand
SQL Injection Prevention in Web Application: A Review 2021 Johny, Joanna Hazaline Binti
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection 2021 Al-Mekhlafi, Zeyad Ghaleb
Alle Artikel auflisten