The Design and Application of a Unified Ontology for Cyber Security

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICISS (19. : 2023 : Raipur) Information systems security
1. Verfasser: Akbar, Khandakar Ashrafi (VerfasserIn)
Weitere Verfasser: Rahman, Fariha Ishrat (VerfasserIn), Singhal, Anoop (VerfasserIn), Khan, Latifur (VerfasserIn), Thuraisingham, Bhavani (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
The Design and Application of a Unified Ontology for Cyber Security 2023 Akbar, Khandakar Ashrafi
Big Data Forensics on Apache Kafka 2023 Mager, Thomas
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases: MongoDB as a Use Case 2023 Dwivedi, Surabhi
Security and Privacy in Machine Learning 2023 Chandran, Nishanth
Attack on the Privacy-Preserving Carpooling Service TAROT 2023 Vargheese, Meghana
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things 2023 Bhaskar, Sourabh
SoK: Digital Signatures and Taproot Transactions in Bitcoin 2023 Jain, Anubha
Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing ToT Networks 2023 Chacko, Lenoah
Private and Verifiable Inter-bank Transactions and Settlements on Blockchain 2023 Narumanchi, Harika
Attack Graph Based Security Metrics for Dynamic Networks 2023 Gain, Ayan
Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints 2023 Balijabudda, Venkata Sreekanth
A Multi-stage Multi-modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features 2023 Das, Arnab Kumar
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology 2023 Sethi, Kamalakanta
PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession 2023 Kar, Jayaprakash
Crypto-Ransomware Detection: A Honey-File Based Approach Using Chi-Square Test 2023 Arakkal, Ajith
An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm Optimization 2023 Kammula, Sunil Kumar
Verifiable Timed Accountable Subgroup Multi-signatures 2023 Özden, Duygu
Analysis of Optimal Number of Shards Using ShardEval, A Simulator for Sharded BIockchains 2023 Priyadarshi, Vishisht
A Security Analysis of Password Managers on Android 2023 Sharma, Abhyudaya
Detection and Hardening Strategies to Secure an Enterprise Network 2023 Mukherjee, Preetam
Alle Artikel auflisten