The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ACES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-2005 (18) 2006-2009 (20) 2010-2012 (19) 2013-2014 (16) 2015-2019 (43) 2020 (51) 2021 (43) 2022-2024 (14)
Publication types (Num. hits)
article(22) inproceedings(194) proceedings(8)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 32 occurrences of 32 keywords

Results
Found 224 publication records. Showing 224 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
158Anirudh Devgan, Ronald A. Rohrer Efficient simulation of interconnect and mixed analog-digital circuits in ACES. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF adaptively controlled explicit simulation, mixed analog-digital circuits, analog circuit simulation, interconnect circuit simulation, AWE macromodels, nonlinear terminations, variable accuracy device models, circuit topology constraints removal, timing, circuit analysis computing, transient analysis, analogue integrated circuits, integrated circuit interconnections, mixed analogue-digital integrated circuits, ACES, transient simulation, timing simulation
82Chao Wang 0001, Bing Li, HoonSang Jin, Gary D. Hachtel, Fabio Somenzi Improving Ariadneýs Bundle by Following Multiple Threads in Abstraction Refinement. Search on Bibsonomy ICCAD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
72Iulia Dragomir, Susanne Graf, Gabor Karsai, Florian Noyrit, Iulian Ober Introduction to ACES-MB 2015. Search on Bibsonomy ACES-MB&WUCOR@MoDELS The full citation details ... 2015 DBLP  BibTeX  RDF
66Jason Cong, Chunyue Liu, Glenn Reinman ACES: application-specific cycle elimination and splitting for deadlock-free routing on irregular network-on-chip. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF application-specific Network-on-Chip, deadlock-free routing
61Boon Toh Low, H. C. Lui, Ah-Hwee Tan, H. H. Teh Connectionist Expert System with Adaptive Learning Capability. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF adaptive learning capability, neural network expert system, adaptive connectionist expert system, past experience, neural logic network, pattern processing, logical inferencing, pattern matching ACES, rule inferencing ACES, past examples, neural logic network, pattern recognition, expert systems, adaptive systems, neural nets, inference mechanisms
61Anirudh Devgan, Ronald A. Rohrer Adaptively controlled explicit simulation. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
47Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar (eds.) Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Kinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Bui Thanh Khoa, Nguyen Duong Thuc Vi Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad A. Aladaileh Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Rafia Afzal, Raja Kumar Murugesan A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi Optimized Stacking Ensemble Model to Detect Phishing Websites. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Abdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah Analysis of File Carving Approaches: A Literature Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Waddah Saeed Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau SQL Injection Prevention in Web Application: A Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Jason Chia, Ji-Jian Chin, Sook-Chin Yip Pluggable Authentication Module Meets Identity-Based Identification. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Faraz Masood, Arman Rasool Faridi A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh Cascade Generalization Based Functional Tree for Website Phishing Detection. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Vu Le, Ramin Moazeni, Melody Moh Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam Intrusion Detection Systems in Fog Computing - A Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Ali Haider Shamsan, Arman Rasool Faridi Security Issues and Challenges in SDN. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf A Conceptual Model to Identify Illegal Activities on the Bitcoin System. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Reem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Ibrahim M. Ahmed, Manar Younis Kashmoola Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Gerard Ward, Lech J. Janczewski Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Rao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Munaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani Blockchain-Based Incentive Mechanism to Combat Fake News. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Poornima Mahadevappa, Raja Kumar Murugesan Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Abhilash Kumar Das, Nirmalya Kar g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Alexander Kreppein, Alexander Kies, Robert H. Schmitt Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli CLH: Approach for Detecting Deep Fake Videos. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Haidar Raad Shakir, Suhad Abbas Yassir Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde An Implementation of Robust User Authentication Technique for Big Data Platform. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah OSINT Explorer: A Tool Recommender Framework for OSINT Sources. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah Securing Software Defined Networking Using Intrusion Detection System - A Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Fatina Shukur Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Jamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Yudhi Fajar Saputra, Mahmoud Ahmad Al-Khasawneh Big Data Analytics: Schizophrenia Prediction on Apache Spark. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Abdul Alif Zakaria, A. H. Azni 0001, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Victor Elijah Adeyemo, Abdullateef Oluwagbemiga Balogun, Hammed Adeleye Mojeed, Noah Oluwatobi Akande, Kayode S. Adewole Ensemble-Based Logistic Model Trees for Website Phishing Detection. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Jetli Chung, Jing-Zhi Koay, Yu-Beng Leau A Review on Social Media Phishing: Factors and Countermeasures. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Hasanen Alyasiri Evolving Rules for Detecting Cross-Site Scripting Attacks Using Genetic Programming. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Azmi Shawkat Abdulbaqi, Salwa Mohammed Nejrs, Sawsan D. Mahmood, Ismail Yusuf Panessai A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Mohammed Shuaib, Shadab Alam, Salwani Mohd Daud Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Jun-Ming Gan, Hang-Yek Ling, Yu-Beng Leau A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Uzma Jafar, Mohd Juzaiddin Ab Aziz A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Abdullateef Oluwagbemiga Balogun, Shuib Basri, Said Jadid Abdulkadir, Saipunidzam Mahamad, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Ganesh M. Kumar Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Yichiet Aun, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Catherine Lim Siew-Hong, Yu-Beng Leau A Performance Study of a Modified Grey Network Traffic Prediction Mechanism. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Riya Khan, Nitesh Kumar, Anand Handa, Sandeep K. Shukla Malware Detection in Word Documents Using Machine Learning. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Jason Chia, Ji-Jian Chin, Sook-Chin Yip Evaluating Pairing-Free Identity-Based Identification Using Curve25519. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Abhilash Kumar Das, Nirmalya Kar A Novel Approach of Text Encryption Using Random Numbers and Hash Table. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Qais Saif Qassim, Norziana Jamil, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi Compromising the Data Integrity of an Electrical Power Grid SCADA System. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Minhaz Bin Farukee, M. S. Zaman Shabit, Md. Rakibul Haque, A. H. M. Sarowar Sattar DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Bahareh Pahlevanzadeh, Sara Koleini, Suzi Iryanti Fadilah Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Poornima Mahadevappa, Raja Kumar Murugesan Study of Container-Based Virtualisation and Threats in Fog Computing. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Yean Li Ho, Michael Teck Hong Gan, Siong-Hoe Lau, Afizan Azman Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai SMOTE-Based Framework for IoT Botnet Attack Detection. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam A Labeled Transactions-Based Dataset on the Ethereum Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Tohari Ahmad, Herdito Ibnu Dewangkoro, Waskitho Wibisono, Royyana Muslim Ijtihadie Protecting Data by Improving the Performance of Controlling Expansion Method. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Kean-Wah Cheng, Swee-Huay Heng Blockchain-Based Content Sharing and Data Repository System. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Kartikeya Gaur, Nitesh Kumar, Anand Handa, Sandeep K. Shukla Static Ransomware Analysis Using Machine Learning and Deep Learning Models. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Sarah K. Taylor, M. Sharizuan M. Omar, Nooraiman Noorashid, Aswami Ariffin, K. Akram Z. Ariffin, S. N. Huda S. Abdullah People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Usman Mohammed Gana, Aman Jantan, Mohd Najwadi Yusoff, Ibrahim Abdullahi, Muhammad Ubale Kiru, Abdullahi Aminu Kazaure Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Ali Abdulrazzaq, Awos Kh. Ali, Supriyanto Praptodiyono The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Antony Taurshia, G. Jaspher W. Kathrine Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Amir Zulhilmi, Salama A. Mostafa, Bashar Ahmed Khalaf, Aida Mustapha, Siti Solehah Tenah A Comparison of Three Machine Learning Algorithms in the Classification of Network Intrusion. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Murtadha A. Alazzawi, Hasanain Abbas Hasan Al-Behadili, Mohsin N. Srayyih Almalki, Aqeel Luaibi Challoob, Mahmood Al Shareeda ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Zi Hau Chin, Timothy Tzen Vun Yap, Ian K. T. Tan Proof-of-Work Difficulty Readjustment with Genetic Algorithm. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Assim Sulaiman Khaled, Yvonne Hwei-Syn Kam Face-Based Graphical Authentication System Using Hybrid Images. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Ali Abed Al-Asadi, Ahmed A. Alkadhmawee Multi-factor Authentication for an Administrator's Devices in an IoT Environment. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Waheed Ali H. M. Ghanem, Yousef A. Baker El-Ebiary, Mohamed Abdulnabi, Mohammad Tubishat, Nayef Abdulwahab Mohammed Alduais, Abdullah B. Nasser, Nibras Abdullah, Ola Ahmed Al-wesabi Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Nazrool Omar, Selvakumar Manickam Rule-Based SLAAC Attack Detection Mechanism. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Collins Uchenna Chimeleze, Norziana Jamil, Roslan Ismail, Kwok-Yan Lam A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47W. Q. Janie Lee, Thian Song Ong, Tee Connie, H. T. Jackson Finger Vein Presentation Attack Detection with Optimized LBP Variants. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Ranil Lee Kotalawela, Jun Hong Lee, Wan Wah Chuah, Kai Wen Luo, Lokman Mohd Fadzil Proposal for Physiological-Resilience Usability Model in Security-Enhanced Mobile Application for Secure Travel. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Tee Wee Jing, Raja Kumar Murugesan Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Shatha A. Baker, Ahmed S. Nori Internet of Things Security: A Survey. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
47Ahmed M. Elmisery, Mirela Sertovic Privacy Preserving Threat Hunting in Smart Home Environments. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Philip Lebedev, Konstantin Kogos, Egor Vasilenko On Way to Simplify the Reverse Engineering of UEFI Firmwares. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Yichiet Aun, Ming-Lee Gan, Yen-Min Jasmina Khaw Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Zhen-Kai Wong, Swee-Huay Heng Blockchain-Based Image Sharing Application. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Ji-Jian Chin, Yvonne Hwei-Syn Kam, Vik Tor Goh Vulnerabilities in Online Food Ordering Website. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Christine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Hala A. Albaroodi, Mohammed Abomaali, Selvakumar Manickam Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Syeda Mariam Muzammal, Raja Kumar Murugesan A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
47Vasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali Mobile Authentication Using Tapping Behavior. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 224 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license