An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm Optimization
|
2023 |
Kammula, Sunil Kumar |
Verifiable Timed Accountable Subgroup Multi-signatures
|
2023 |
Özden, Duygu |
Analysis of Optimal Number of Shards Using ShardEval, A Simulator for Sharded BIockchains
|
2023 |
Priyadarshi, Vishisht |
The Design and Application of a Unified Ontology for Cyber Security
|
2023 |
Akbar, Khandakar Ashrafi |
Big Data Forensics on Apache Kafka
|
2023 |
Mager, Thomas |
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases: MongoDB as a Use Case
|
2023 |
Dwivedi, Surabhi |
Security and Privacy in Machine Learning
|
2023 |
Chandran, Nishanth |
Attack on the Privacy-Preserving Carpooling Service TAROT
|
2023 |
Vargheese, Meghana |
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things
|
2023 |
Bhaskar, Sourabh |
SoK: Digital Signatures and Taproot Transactions in Bitcoin
|
2023 |
Jain, Anubha |
Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing ToT Networks
|
2023 |
Chacko, Lenoah |
Private and Verifiable Inter-bank Transactions and Settlements on Blockchain
|
2023 |
Narumanchi, Harika |
A Security Analysis of Password Managers on Android
|
2023 |
Sharma, Abhyudaya |
Detection and Hardening Strategies to Secure an Enterprise Network
|
2023 |
Mukherjee, Preetam |
MDLDroid: Multimodal Deep Learning Based Android Malware Detection
|
2023 |
Singh, Narendra |
STN-Net: A Robust GAN-Generated Face Detector
|
2023 |
Ghosh, Tanusree |
A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks
|
2023 |
Rodriguez, David |
Secure KNN Computationon Cloud
|
2023 |
Sanyashi, Tikaram |
Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting
|
2023 |
Parbat, Tanusree |
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing
|
2023 |
Thushara, G. A. |