Information Sharing in the Presence of Adversarial Nodes Using Raft
|
2022 |
Zamir, Linir |
How Can Organizations Prevent Cyber Attacks Using Proper Cloud Computing Security?
|
2022 |
Bahkali, Ismail Mohammed |
AgentHunt: Honeypot and IDS Based Network Monitoring Device to Secure Home Networks
|
2022 |
Pramodya, U. J. C. |
Evaluation of System Features Used for Malware Detection
|
2022 |
Balogh, Štefan |
A Secure Mixed Reality Framework for the Internet of Things
|
2022 |
Skaggs-Schellenberg, Russell |
A New Method Searching Globally Optimal Solutions to Discrete Optimization Problems
|
2022 |
Groppen, Vitaly O. |
A Serious Game for Teaching Genetic Algorithms
|
2022 |
Moser, Lars |
The Knowledge-Based Design of Educational Technology
|
2022 |
Svetsky, Stefan |
Hierarchical Evaluation of Software Projects: An Experiment
|
2022 |
Saeed, Mustafa Ghanem |
Ladder of Trust
|
2022 |
Heiden, Bernhard |
An Analytical Review of Load Balancing in Heterogeneous Networks
|
2022 |
Hossen, Azhar Ali |
Pricing 5G Network Slices Based on NFV MANO
|
2022 |
Chen, Zhao Ru |
Effect of Cyber Attacks on the Performance of Optimally Designed Network for Distributed Secondary Voltage Control in Microgrids
|
2022 |
Beddard, Gabrielle |
Evaluation of Supervised Machine Learning Algorithms for Multi-class Intrusion Detection Systems
|
2022 |
Kaddoura, Sanaa |
Understanding Risks of Sharing Images in the Context of Deepfakes Technology
|
2022 |
Madhisetty, Srinivas |
Spacecraft for Deep Space Exploration: Combining Time and Budget to Model the Trend in Lifespan
|
2022 |
Tsai, Peng-Hung |
A2Cloud-H: A Multi-tiered Machine Learning Framework for Cost-Effective Cloud Resource Selection
|
2022 |
Ai, Xusheng |
Ranking-Based Community Detection for Social Networks
|
2022 |
Pirouz, Matin |
Design and Implementation of a Chorded-Keyboard Mapping for Existing VR Hand Controllers
|
2022 |
Norton, Wil J. |
A Helpful Relocation Function for Augmenting Teaching in a Multiple User Shared Virtual Environment
|
2022 |
Deakyne, Alex J. |