Histogram-Based Intrusion Detection and Filtering Framework for Secure and Safe In-Vehicle Networks | 0 | 0.34 | 2022 |
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism For Detecting Internal Attacks In Internet Of Things | 4 | 0.38 | 2021 |
Tridroid: A Triage And Classification Framework For Fast Detection Of Mobile Threats In Android Markets | 0 | 0.34 | 2021 |
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning | 0 | 0.34 | 2020 |
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing | 1 | 0.35 | 2020 |
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. | 1 | 0.37 | 2020 |
Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues | 15 | 0.64 | 2020 |
Authentication schemes for smart mobile devices: threat models, countermeasures, and open research issues | 3 | 0.45 | 2020 |
NSNAD: negative selection-based network anomaly detection approach with relevant feature subset | 1 | 0.35 | 2020 |
Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges | 4 | 0.36 | 2020 |
Intrusion Detection System For Internet Of Things Based On Temporal Convolution Neural Network And Efficient Feature Engineering | 0 | 0.34 | 2020 |
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges | 2 | 0.36 | 2020 |
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance | 0 | 0.34 | 2020 |
A review of privacy-preserving techniques for deep learning. | 0 | 0.34 | 2020 |
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. | 0 | 0.34 | 2019 |
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. | 0 | 0.34 | 2019 |
Accurate detection of sitting posture activities in a secure IoT based assisted living environment. | 1 | 0.35 | 2019 |
Threats, Protection and Attribution of Cyber Attacks on Critical Infrastructures. | 0 | 0.34 | 2019 |
Blockchain Technologies for the Internet of Things: Research Issues and Challenges. | 34 | 0.80 | 2019 |
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks | 0 | 0.34 | 2019 |
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends. | 1 | 0.34 | 2019 |
Authentication for Smart Grid AMI Systems: Threat Models, Solutions, and Challenges | 0 | 0.34 | 2019 |
Toward an optimal solution against Denial of Service attacks in Software Defined Networks. | 4 | 0.48 | 2019 |
Reducing the effects of DoS attacks in software defined networks using parallel flow installation | 0 | 0.34 | 2019 |
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. | 3 | 0.39 | 2019 |
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. | 6 | 0.38 | 2019 |
Trust models of internet of smart things: A survey, open issues, and future directions. | 6 | 0.42 | 2019 |
Combined Dynamic Multi-Feature And Rule-Based Behavior For Accurate Malware Detection | 0 | 0.34 | 2019 |
VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems. | 2 | 0.37 | 2018 |
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art. | 1 | 0.35 | 2018 |
Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures. | 2 | 0.39 | 2018 |
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. | 0 | 0.34 | 2018 |
Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices | 0 | 0.34 | 2018 |
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers. | 0 | 0.34 | 2018 |
MalDozer: Automatic framework for android malware detection using deep learning. | 21 | 0.87 | 2018 |
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions. | 9 | 0.54 | 2018 |
Efficient and privacy-aware multi-party classification protocol for human activity recognition. | 0 | 0.34 | 2017 |
Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. | 0 | 0.34 | 2017 |
Android Malware Detection using Deep Learning on API Method Sequences. | 1 | 0.35 | 2017 |
A Survey of Authentication Schemes in Telecare Medicine Information Systems. | 7 | 0.47 | 2017 |
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness. | 2 | 0.37 | 2017 |
Wireless and mobile sensing technologies for the future Internet. | 2 | 0.42 | 2017 |
Mmsmac: A Multi-Mode Medium Access Control Protocol For Wireless Sensor Networks | 1 | 0.35 | 2016 |
Cypider: building community-based cyber-defense infrastructure for android malware detection. | 6 | 0.47 | 2016 |
Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks. | 0 | 0.34 | 2016 |
Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network. | 1 | 0.36 | 2016 |
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices. | 0 | 0.34 | 2016 |
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks. | 5 | 0.42 | 2016 |
A review of secure routing approaches for current and next-generation wireless multimedia sensor networks | 3 | 0.36 | 2015 |
Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society. | 22 | 1.21 | 2015 |