An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices | 1 | 0.36 | 2020 |
Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. | 2 | 0.40 | 2018 |
Intracranial volumetric changes govern cerebrospinal fluid flow in the Aqueduct of Sylvius in healthy adults. | 0 | 0.34 | 2017 |
Handover Optimised Authentication Scheme for High Mobility Wireless Multicast. | 0 | 0.34 | 2015 |
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast | 15 | 0.67 | 2015 |
Efficient authenticated multi-service group key management for secure wireless mobile multicast | 4 | 0.47 | 2014 |
Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication. | 0 | 0.34 | 2014 |
A Multi-service Cluster-Based Decentralized Group Key Management Scheme for High Mobility Users. | 1 | 0.37 | 2014 |
Extraction of Desired Signal Based on AR Model with Its Application to Atrial Activity Estimation in Atrial Fibrillation | 4 | 0.43 | 2008 |
Stream or Block Cipher for Securing VoIP? | 8 | 0.91 | 2007 |
Concepts and architectures for next-generation information search engines | 1 | 0.35 | 2007 |
A Comprehensive Secure VoIP Solution | 2 | 0.39 | 2007 |
The Tiny Encryption Algorithm | 4 | 0.60 | 2007 |
Clustering gene expression data for periodic genes based on INMF | 0 | 0.34 | 2006 |
QoS Control Using an End-Point CPU Capability Detector in a Secure VoIP System | 4 | 0.75 | 2005 |
Bradford: Building a new cremona? | 0 | 0.34 | 2005 |
Extracting characteristic patterns from genome-wide expression data by non-negative matrix factorization | 8 | 0.63 | 2004 |
Cryptanalysis of a summation generator with 2-bit memory | 1 | 0.38 | 2002 |
A High-Speed Software Implementation Of The Data Encryption Standard | 3 | 0.43 | 1995 |
Distortion analysis of the bulk FFT structure for multi-carrier demodulators | 1 | 1.27 | 1995 |
THE QUADRATIC RESIDUE CIPHER AND SOME NOTES ON IMPLEMENTATION | 1 | 0.43 | 1993 |