Information Sharing in the Presence of Adversarial Nodes Using Raft
|
2022 |
Zamir, Linir |
How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security?
|
2022 |
Bahkali, Ismail Mohammed |
AgentHunt: Honeypot and IDS Based Network Monitoring Device to Secure Home Networks
|
2022 |
Pramodya, U. J. C. |
Evaluation of System Features Used for Malware Detection
|
2022 |
Balogh, Štefan |
A Secure Mixed Reality Framework for the Internet of Things
|
2022 |
Skaggs-Schellenberg, Russell |
A New Method Searching Globally Optimal Solutions to Discrete Optimization Problems
|
2022 |
Groppen, Vitaly O. |
A Serious Game for Teaching Genetic Algorithms
|
2022 |
Moser, Lars |
The Knowledge-Based Design of Educational Technology
|
2022 |
Svetsky, Stefan |
Hierarchical Evaluation of Software Projects: An Experiment
|
2022 |
Saeed, Mustafa Ghanem |
Ladder of Trust
|
2022 |
Heiden, Bernhard |
Double-Extortion Ransomware: A Technical Analysis of Maze Ransomware
|
2022 |
Kerns, Quintin |
Patterns in Malware Attacks Leveraging COVID-19 Pandemic Fears
|
2022 |
Norris, Jason H. |
Advancement on Security Applications of Private Intersection Sum Protocol
|
2022 |
Raghuvir, Y. Athur |
Efficient Secret Sharing-Based Partial Matching Search Using Error Correction Code
|
2022 |
Iwamura, Keiichi |
A CRYSTALS-Dilithium Response-Based Cryptography Engine Using GPGPU
|
2022 |
Wright, Jordan |
Quantum Computing and Its Application in Cryptography
|
2022 |
Yung, Choi Tim Antony |
Gray Matters and Complex Systems: Mind, Consciousness, and Attention
|
2022 |
Semwal, Sudhanshu Kumar |
A Novel Artificial Intelligence Technique for Cloud Computing Using a New Heuristic Initialisation and PSO-Parallel Execution
|
2022 |
Chraibi, Amine |
Enabling Extreme High-Throughput Multi-precision Computing on General-Purpose Microprocessor
|
2022 |
Xu, Lei |
Content Agnostic Game Engineering: Impact of Stealth Assessment and Content Order on Player Engagement
|
2022 |
Verma, Vipin |