Showing 40 - 52 of 226
View by: Cover Page List Articles
-
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones
published 10 Mar 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Topic recognition and refined evolution path analysis of literature in the field of cybersecurity
published 21 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment
published 06 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
An intelligent spam detection framework using fusion of spammer behavior and linguistic
published 06 Feb 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Personal, environmental and behavioral predictors associated with online fraud victimization among adults
published 29 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Intelligent classification of computer vulnerabilities and network security management system: Combining memristor neural network and improved TCNN model
published 27 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP
published 27 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Applying fractional calculus to malware spread: A fractal-based approach to threat analysis
published 08 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
The privacy protection of the internet of vehicles resource transaction details based on blockchain
published 03 Jan 2025
Loading metrics information...
Metrics unavailable. Please check back later.
-
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing
published 30 Dec 2024
Loading metrics information...
Metrics unavailable. Please check back later.
-
A cost-effective adaptive repair strategy to mitigate DDoS-capable IoT botnets
published 26 Dec 2024
Loading metrics information...
Metrics unavailable. Please check back later.
-
Toward secure mobile applications through proper authentication mechanisms
published 05 Dec 2024
Loading metrics information...
Metrics unavailable. Please check back later.
-
TPAAS: Trustworthy privacy-preserving anonymous authentication scheme for online trading environment
published 18 Nov 2024
Loading metrics information...
Metrics unavailable. Please check back later.
Connect with Us