Showing 157 - 169 of 226
View by: Cover Page List Articles
-
Protecting contacts against privacy leaks in smartphones
published 11 Jul 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Detecting opinion spams through supervised boosting approach
published 11 Jun 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
published 27 Apr 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Sonification of network traffic flow for monitoring and situational awareness
published 19 Apr 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy
published 16 Mar 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
published 13 Mar 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
An improved anonymous authentication scheme for roaming in ubiquitous networks
published 05 Mar 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid
published 27 Feb 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage
published 25 Jan 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
Abnormal network flow detection based on application execution patterns from Web of Things (WoT) platforms
published 19 Jan 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
A two-stage flow-based intrusion detection model for next-generation networks
published 12 Jan 2018
Loading metrics information...
Metrics unavailable. Please check back later.
-
A decoy chain deployment method based on SDN and NFV against penetration attack
published 07 Dec 2017
Loading metrics information...
Metrics unavailable. Please check back later.
-
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
published 09 Nov 2017
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us