ID |
Domain |
Technology |
Title |
Year |
View |
30 |
NETWORK SECURITY |
JAVA |
REMADD: RESOURCE-EFFICIENT MALICIOUS DOMAINS DETECTOR IN LARGE-SCALE NETWORKS |
2020 |
View |
31 |
NETWORK SECURITY |
JAVA |
SOFTWARE-DEFINED NETWORKING-ENABLED HETEROGENEOUS WIRELESS NETWORKS AND APPLICATIONS CONVERGENCE |
2020 |
View |
32 |
NETWORK SECURITY |
JAVA |
DISTRIBUTED LOCALIZATION IN WIRELESS SENSOR NETWORKS UNDER DENIAL-OF-SERVICE ATTACKS |
2020 |
View |
33 |
NETWORK SECURITY |
JAVA |
INTELLIGENT PROCESSING OF INTRUSION DETECTION DATA |
2020 |
View |
34 |
NETWORK SECURITY |
JAVA |
PAGODA: A HYBRID APPROACH TO ENABLE EFFICIENT REAL-TIME PROVENANCE BASED INTRUSION DETECTION IN BIG DATA ENVIRONMENTS |
2018 |
View |
35 |
NETWORK SECURITY |
JAVA |
SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS |
2015 |
View |
36 |
NETWORK SECURITY |
JAVA |
MIO: ENHANCING WIRELESS COMMUNICATIONS SECURITY THROUGH PHYSICAL LAYER MULTIPLE INTER-SYMBOL OBFUSCATION |
2015 |
View |
37 |
NETWORK SECURITY |
JAVA |
OPTIMAL PROBABILISTIC ENCRYPTION FOR SECURE DETECTION IN WIRELESS SENSOR NETWORKS |
2014 |
View |
38 |
NETWORK SECURITY |
JAVA |
A LIGHTWEIGHT ENCRYPTION SCHEME FOR NETWORK-CODED MOBILE ADHOC NETWORKS |
2014 |
View |
156 |
NETWORK SECURITY |
DOTNET |
TRUST AND REPUTATION MANAGEMENT FOR SECURING COLLABORATION IN 5G ACCESS NETWORKS: THE ROAD AHEAD |
2020 |
View |
157 |
NETWORK SECURITY |
DOTNET |
EFFICIENT TIME-STABLE GEOCAST ROUTING IN DELAY-TOLERANT VEHICULAR AD-HOC NETWORKS |
2020 |
View |
158 |
NETWORK SECURITY |
DOTNET |
ENERGY-AWARE SERVICE SELECTION AND ADAPTATION IN WIRELESS SENSOR NETWORKS WITH QOS GUARANTEE |
2020 |
View |
159 |
NETWORK SECURITY |
DOTNET |
AUTHENTICATION BY ENCRYPTED NEGATIVE PASSWORD |
2019 |
View |
160 |
NETWORK SECURITY |
DOTNET |
PFP: IMPROVING THE RELIABILITY OF DEDUPLICATION-BASED STORAGE SYSTEMS WITH PER-FILE PARITY |
2019 |
View |
162 |
NETWORK SECURITY |
DOTNET |
EFFICIENT INTRUSION DETECTION WITH BLOOM FILTERING IN CONTROLLER AREA NETWORKS (CAN) |
2019 |
View |
163 |
NETWORK SECURITY |
DOTNET |
A HIGHLY EFFICIENT SIDE CHANNEL ATTACK WITH PROFILING THROUGH RELEVANCE-LEARNING ON PHYSICAL LEAKAGE INFORMATION |
2019 |
View |
164 |
NETWORK SECURITY |
DOTNET |
PEER PREDICTION BASED TRUSTWORTHINESS EVALUATION AND TRUSTWORTHY SERVICE RATING IN SOCIAL NETWORKS |
2019 |
View |
165 |
NETWORK SECURITY |
DOTNET |
DROPS: DIVISION AND REPLICATION OF DATA IN CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY |
2018 |
View |
166 |
NETWORK SECURITY |
DOTNET |
PRIVACY-PRESERVING LOCATION-BASED SERVICES QUERY SCHEME AGAINST QUANTUM ATTACKS |
2018 |
View |
167 |
NETWORK SECURITY |
DOTNET |
DYNAMIC PACKET FORWARDING VERIFICATION IN SDN |
2018 |
View |
168 |
NETWORK SECURITY |
DOTNET |
EFFICIENT MULTIFACTOR AUTHENTICATION KEY EXCHANGE SCHEME FOR MOBILE COMMUNICATIONS |
2017 |
View |
169 |
NETWORK SECURITY |
DOTNET |
STRONG KEY-EXPOSURE RESILIENT AUDITING FOR SECURE CLOUD STORAGE |
2017 |
View |
170 |
NETWORK SECURITY |
DOTNET |
AUTHENTICATED KEY EXCHANGE PROTOCOLS FOR PARALLEL NETWORK FILE SYSTEMS |
2016 |
View |
171 |
NETWORK SECURITY |
DOTNET |
A SECURE ANTI-COLLUSION DATA SHARING SCHEME FOR DYNAMIC GROUPS IN THE CLOUD |
2016 |
View |
172 |
NETWORK SECURITY |
DOTNET |
DDSGA: A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT APPROACH FOR DETECTING MASQUERADE ATTACKS |
2015 |
View |
173 |
NETWORK SECURITY |
DOTNET |
SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF COLLUSION ATTACKS |
2015 |
View |
174 |
NETWORK SECURITY |
DOTNET |
PRIVACY-PRESERVING DETECTION OF SENSITIVE DATA EXPOSURE |
2015 |
View |
175 |
NETWORK SECURITY |
DOTNET |
ANONYMOUS TWO-FACTOR AUTHENTICATION IN DISTRIBUTED SYSTEMS: CERTAIN GOALS ARE BEYOND ATTAINMENT |
2015 |
View |
176 |
NETWORK SECURITY |
DOTNET |
CAPTCHA AS GRAPHICAL PASSWORDS?A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS |
2014 |
View |
177 |
NETWORK SECURITY |
DOTNET |
SECRET KEY GENERATION IN THE TWO-WAY RELAY CHANNEL WITH ACTIVE ATTACKERS |
2014 |
View |
178 |
NETWORK SECURITY |
DOTNET |
DYNAMIC AUTHENTICATION WITH SENSORY INFORMATION FOR THE ACCESS CONTROL SYSTEMS |
2014 |
View |