XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks | 0 | 0.34 | 2022 |
SDN-Assisted Safety Message Dissemination Framework for Vehicular Critical Energy Infrastructure | 2 | 0.36 | 2022 |
CDPS-IoT: Cardiovascular Disease Prediction System Based on IoT Using Machine Learning | 0 | 0.34 | 2022 |
The monarch butterfly optimization algorithm for solving feature selection problems | 0 | 0.34 | 2022 |
Multiobjective whale optimization algorithm-based feature selection for intelligent systems | 0 | 0.34 | 2022 |
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System | 0 | 0.34 | 2022 |
InFeMo: Flexible Big Data Management Through a Federated Cloud System | 1 | 0.40 | 2022 |
Real-Time Traffic Speed Estimation for Smart Cities with Spatial Temporal Data: A Gated Graph Attention Network Approach | 0 | 0.34 | 2022 |
A location-based privacy-preserving oblivious sharing scheme for indoor navigation | 0 | 0.34 | 2022 |
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system | 0 | 0.34 | 2022 |
Blockchain-Based Secure Data Storage Protocol for Sensors in the Industrial Internet of Things | 1 | 0.35 | 2022 |
Myocardial infarction detection based on deep neural network on imbalanced data | 0 | 0.34 | 2022 |
Efficient deep learning approach for augmented detection of Coronavirus disease | 5 | 0.52 | 2022 |
Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions | 1 | 0.35 | 2022 |
Synergic Deep Learning for Smart Health Diagnosis of COVID-19 for Connected Living and Smart Cities | 0 | 0.34 | 2022 |
Building a knowledge graph by using cross-lingual transfer method and distributed MinIE algorithm on apache spark | 0 | 0.34 | 2022 |
A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box | 0 | 0.34 | 2022 |
A survey of phishing attack techniques, defence mechanisms and open research challenges | 0 | 0.34 | 2022 |
Boosting-Based DDoS Detection in Internet of Things Systems | 0 | 0.34 | 2022 |
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks | 0 | 0.34 | 2022 |
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers: A Comparative Study | 0 | 0.34 | 2022 |
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments | 0 | 0.34 | 2022 |
An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency | 0 | 0.34 | 2022 |
A PBNM and economic incentive-based defensive mechanism against DDoS attacks | 0 | 0.34 | 2022 |
A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care | 7 | 0.50 | 2021 |
A Taxonomy Of Various Attacks On Smart Card-Based Applications And Countermeasures | 0 | 0.34 | 2021 |
IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network | 9 | 0.45 | 2021 |
Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things | 3 | 0.65 | 2021 |
Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images | 0 | 0.34 | 2021 |
A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense | 1 | 0.37 | 2021 |
Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model | 7 | 0.50 | 2021 |
Dns Rule-Based Schema To Botnet Detection | 0 | 0.34 | 2021 |
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection | 0 | 0.34 | 2020 |
An Internet-Of-Things-Based Security Scheme For Healthcare Environment For Robust Location Privacy | 0 | 0.34 | 2020 |
IoT transaction processing through cooperative concurrency control on fog–cloud computing environment | 6 | 0.42 | 2020 |
An efficient KP design framework of attribute‐based searchable encryption for user level revocation in cloud | 0 | 0.34 | 2020 |
Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN. | 0 | 0.34 | 2020 |
Soft computing techniques for big data and cloud computing | 0 | 0.34 | 2020 |
A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures | 0 | 0.34 | 2020 |
Parallel implementation for 3D medical volume fuzzy segmentation | 17 | 0.69 | 2020 |
Multi Attribute Auction Based Incentivized Solution Against DDoS Attacks | 0 | 0.34 | 2020 |
Attribute-Based Access Control And Authentication Mechanism Using Smart Cards For Cloud-Based Iot Applications | 0 | 0.34 | 2020 |
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security | 12 | 0.61 | 2020 |
Taxonomy of Payment Structures and Economic Incentive Schemes in Internet | 0 | 0.34 | 2020 |
Phishing Attack Detection using a Search Engine and Heuristics-based Technique | 0 | 0.34 | 2020 |
Visual saliency guided complex image retrieval | 12 | 0.54 | 2020 |
An Overview Of Internet Of Things (Iot): Architectural Aspects, Challenges, And Protocols | 9 | 0.54 | 2020 |
Deep learning models for human centered computing in fog and mobile edge networks | 1 | 0.35 | 2019 |
Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches | 0 | 0.34 | 2019 |
Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques | 14 | 0.51 | 2019 |