Memory Augmented Hyper-Heuristic Framework To Solve Multi-Disciplinary Problems Inspired By Cognitive Problem Solving Skills | 0 | 0.34 | 2021 |
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism For Detecting Internal Attacks In Internet Of Things | 4 | 0.38 | 2021 |
Subjective Logic-Based Trust Model For Fog Computing | 1 | 0.35 | 2021 |
Tridroid: A Triage And Classification Framework For Fast Detection Of Mobile Threats In Android Markets | 0 | 0.34 | 2021 |
Hand-based multibiometric systems: state-of-the-art and future challenges | 0 | 0.34 | 2021 |
A context-aware encryption protocol suite for edge computing-based IoT devices | 0 | 0.34 | 2020 |
Blockchain and Smart Healthcare Security - A Survey. | 1 | 0.36 | 2020 |
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks | 2 | 0.37 | 2020 |
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing | 1 | 0.35 | 2020 |
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. | 1 | 0.37 | 2020 |
Formal Verification of Hardware Components in Critical Systems. | 0 | 0.34 | 2020 |
Intrusion Detection System For Internet Of Things Based On Temporal Convolution Neural Network And Efficient Feature Engineering | 0 | 0.34 | 2020 |
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance | 0 | 0.34 | 2020 |
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. | 0 | 0.34 | 2019 |
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. | 0 | 0.34 | 2019 |
Accurate detection of sitting posture activities in a secure IoT based assisted living environment. | 1 | 0.35 | 2019 |
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks | 0 | 0.34 | 2019 |
A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection. | 0 | 0.34 | 2019 |
Toward an optimal solution against Denial of Service attacks in Software Defined Networks. | 4 | 0.48 | 2019 |
Reducing the effects of DoS attacks in software defined networks using parallel flow installation | 0 | 0.34 | 2019 |
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. | 3 | 0.39 | 2019 |
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. | 6 | 0.38 | 2019 |
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research. | 1 | 0.41 | 2019 |
An Efficient Routing Protocol Based on Stretched Holding Time Difference for Underwater Wireless Sensor Networks. | 0 | 0.34 | 2019 |
Combined Dynamic Multi-Feature And Rule-Based Behavior For Accurate Malware Detection | 0 | 0.34 | 2019 |
Security Safety and Trust Management (SSTM' 19) | 0 | 0.34 | 2019 |
A Multi-Classifier Framework for Open Source Malware Forensics | 0 | 0.34 | 2018 |
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: <Emphasis Type="Italic">A Systematic Literature Review</Emphasis> | 3 | 0.39 | 2018 |
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection | 2 | 0.37 | 2018 |
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection | 2 | 0.37 | 2018 |
Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks. | 0 | 0.34 | 2018 |
Securing wireless sensor networks for improved performance in cloud-based environments. | 4 | 0.42 | 2017 |
Security, Safety and Trust Management (SSTM ‘17) | 0 | 0.34 | 2017 |
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks. | 6 | 0.51 | 2017 |
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. | 0 | 0.34 | 2017 |
A Comprehensive Survey on Security in Cloud Computing. | 3 | 0.39 | 2017 |
A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments. | 2 | 0.36 | 2017 |
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems. | 4 | 0.40 | 2017 |
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms. | 1 | 0.35 | 2016 |
Identifying an OpenID anti-phishing scheme for cyberspace. | 0 | 0.34 | 2016 |
Network intrusion detection using hybrid binary PSO and random forests algorithm | 7 | 0.44 | 2015 |
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art | 24 | 0.65 | 2015 |
Anomaly detection in Wireless Sensor Networks using immune-based bioinspired mechanism | 3 | 0.41 | 2015 |
ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment. | 1 | 0.35 | 2015 |
A framework to address inconstant user requirements in cloud SLAs management | 2 | 0.37 | 2015 |
Analysis of Detection Features for Wormhole Attacks in MANETs | 2 | 0.38 | 2015 |
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks | 85 | 0.79 | 2014 |
Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks. | 3 | 0.40 | 2014 |
A Cloud-based Healthcare Framework for Security and Patients’ Data Privacy Using Wireless Body Area Networks | 14 | 0.69 | 2014 |
Particle Swarm Optimization with non-linear velocity | 1 | 0.36 | 2014 |