A novel cloud management framework for trust establishment and evaluation in a federated cloud environment | 0 | 0.34 | 2021 |
Malicious Insider Attack Detection in IoTs Using Data Analytics | 1 | 0.36 | 2020 |
Analytical study of hardware-rooted security standards and their implementation techniques in mobile | 0 | 0.34 | 2020 |
Detection of Denial of Service (DoS) Attack in Vehicular Ad Hoc Networks: A Systematic Literature Review. | 0 | 0.34 | 2018 |
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: <Emphasis Type="Italic">A Systematic Literature Review</Emphasis> | 3 | 0.39 | 2018 |
An Adaptive Rule-Based Approach to Resolving Real-Time VoIP Wholesale Billing Disputes. | 0 | 0.34 | 2017 |
Performance evaluation of Enhanced Very Fast Decision Tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems. | 3 | 0.39 | 2016 |
Distributed denial of service DDoS attack detection using data mining approach in cloud-assisted wireless body area networks | 1 | 0.35 | 2016 |
Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment. | 3 | 0.37 | 2016 |
EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network. | 9 | 0.52 | 2015 |
Designing an Assistive Learning Aid for Writing Acquisition: A Challenge for Children with Dyslexia. | 0 | 0.34 | 2015 |
Analyzing Feasibility For Deploying Very Fast Decision Tree For Ddos Attack Detection In Cloud-Assisted Wban | 4 | 0.49 | 2014 |
A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSN | 0 | 0.34 | 2012 |
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs) | 10 | 0.71 | 2009 |