The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACeS"( http://dblp.L3S.de/Venues/ACeS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aces

Publication years (Num. hits)
2019 (26) 2020 (47) 2021 (38)
Publication types (Num. hits)
inproceedings(108) proceedings(3)
Venues (Conferences, Journals, ...)
ACeS(111)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 111 publication records. Showing 111 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Kinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Bui Thanh Khoa, Nguyen Duong Thuc Vi Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad A. Aladaileh Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rafia Afzal, Raja Kumar Murugesan A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi Optimized Stacking Ensemble Model to Detect Phishing Websites. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah Analysis of File Carving Approaches: A Literature Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Waddah Saeed Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau SQL Injection Prevention in Web Application: A Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jason Chia, Ji-Jian Chin, Sook-Chin Yip Pluggable Authentication Module Meets Identity-Based Identification. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Faraz Masood, Arman Rasool Faridi A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh Cascade Generalization Based Functional Tree for Website Phishing Detection. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vu Le, Ramin Moazeni, Melody Moh Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam Intrusion Detection Systems in Fog Computing - A Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ali Haider Shamsan, Arman Rasool Faridi Security Issues and Challenges in SDN. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf A Conceptual Model to Identify Illegal Activities on the Bitcoin System. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Reem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ibrahim M. Ahmed, Manar Younis Kashmoola Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gerard Ward, Lech J. Janczewski Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Rao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Munaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani Blockchain-Based Incentive Mechanism to Combat Fake News. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Poornima Mahadevappa, Raja Kumar Murugesan Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar (eds.) Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Abhilash Kumar Das, Nirmalya Kar g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alexander Kreppein, Alexander Kies, Robert H. Schmitt Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli CLH: Approach for Detecting Deep Fake Videos. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Haidar Raad Shakir, Suhad Abbas Yassir Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde An Implementation of Robust User Authentication Technique for Big Data Platform. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah OSINT Explorer: A Tool Recommender Framework for OSINT Sources. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah Securing Software Defined Networking Using Intrusion Detection System - A Review. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Fatina Shukur Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. Search on Bibsonomy ACeS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yudhi Fajar Saputra, Mahmoud Ahmad Al-Khasawneh Big Data Analytics: Schizophrenia Prediction on Apache Spark. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abdul Alif Zakaria, A. H. Azni 0001, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Victor Elijah Adeyemo, Abdullateef Oluwagbemiga Balogun, Hammed Adeleye Mojeed, Noah Oluwatobi Akande, Kayode S. Adewole Ensemble-Based Logistic Model Trees for Website Phishing Detection. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jetli Chung, Jing-Zhi Koay, Yu-Beng Leau A Review on Social Media Phishing: Factors and Countermeasures. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hasanen Alyasiri Evolving Rules for Detecting Cross-Site Scripting Attacks Using Genetic Programming. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Azmi Shawkat Abdulbaqi, Salwa Mohammed Nejrs, Sawsan D. Mahmood, Ismail Yusuf Panessai A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammed Anbar, Nibras Abdullah, Selvakumar Manickam (eds.) Advances in Cyber Security - First International Conference, ACeS 2019, Penang, Malaysia, July 30 - August 1, 2019, Revised Selected Papers Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammed Shuaib, Shadab Alam, Salwani Mohd Daud Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jun-Ming Gan, Hang-Yek Ling, Yu-Beng Leau A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Uzma Jafar, Mohd Juzaiddin Ab Aziz A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mahmood Al Shareeda, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Ayman Khalil, Murtadha A. Alazzawi, Ahmed Shakir Al-Hiti Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abdullateef Oluwagbemiga Balogun, Shuib Basri, Said Jadid Abdulkadir, Saipunidzam Mahamad, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Ganesh M. Kumar Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yichiet Aun, Yen-Min Jasmina Khaw, Ming-Lee Gan, Vasaki Ponnusamy Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Catherine Lim Siew-Hong, Yu-Beng Leau A Performance Study of a Modified Grey Network Traffic Prediction Mechanism. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Riya Khan, Nitesh Kumar, Anand Handa, Sandeep K. Shukla Malware Detection in Word Documents Using Machine Learning. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jason Chia, Ji-Jian Chin, Sook-Chin Yip Evaluating Pairing-Free Identity-Based Identification Using Curve25519. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abhilash Kumar Das, Nirmalya Kar A Novel Approach of Text Encryption Using Random Numbers and Hash Table. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Qais Saif Qassim, Norziana Jamil, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi Compromising the Data Integrity of an Electrical Power Grid SCADA System. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Minhaz Bin Farukee, M. S. Zaman Shabit, Md. Rakibul Haque, A. H. M. Sarowar Sattar DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bahareh Pahlevanzadeh, Sara Koleini, Suzi Iryanti Fadilah Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Poornima Mahadevappa, Raja Kumar Murugesan Study of Container-Based Virtualisation and Threats in Fog Computing. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yean Li Ho, Michael Teck Hong Gan, Siong-Hoe Lau, Afizan Azman Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai SMOTE-Based Framework for IoT Botnet Attack Detection. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Salam Al-Emari, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam A Labeled Transactions-Based Dataset on the Ethereum Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tohari Ahmad, Herdito Ibnu Dewangkoro, Waskitho Wibisono, Royyana Muslim Ijtihadie Protecting Data by Improving the Performance of Controlling Expansion Method. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kean-Wah Cheng, Swee-Huay Heng Blockchain-Based Content Sharing and Data Repository System. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kartikeya Gaur, Nitesh Kumar, Anand Handa, Sandeep K. Shukla Static Ransomware Analysis Using Machine Learning and Deep Learning Models. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sarah K. Taylor, M. Sharizuan M. Omar, Nooraiman Noorashid, Aswami Ariffin, K. Akram Z. Ariffin, S. N. Huda S. Abdullah People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Usman Mohammed Gana, Aman Jantan, Mohd Najwadi Yusoff, Ibrahim Abdullahi, Muhammad Ubale Kiru, Abdullahi Aminu Kazaure Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ali Abdulrazzaq, Awos Kh. Ali, Supriyanto Praptodiyono The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Antony Taurshia, G. Jaspher W. Kathrine Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Amir Zulhilmi, Salama A. Mostafa, Bashar Ahmed Khalaf, Aida Mustapha, Siti Solehah Tenah A Comparison of Three Machine Learning Algorithms in the Classification of Network Intrusion. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad, Engku Fadzli Hasan Syed Abdullah, Waheed Ali H. M. Ghanem Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Murtadha A. Alazzawi, Hasanain Abbas Hasan Al-Behadili, Mohsin N. Srayyih Almalki, Aqeel Luaibi Challoob, Mahmood Al Shareeda ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zi Hau Chin, Timothy Tzen Vun Yap, Ian K. T. Tan Proof-of-Work Difficulty Readjustment with Genetic Algorithm. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aws Naser Jaber, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Assim Sulaiman Khaled, Yvonne Hwei-Syn Kam Face-Based Graphical Authentication System Using Hybrid Images. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abdulla J. Y. Aldarwish, Ali A. Yassin, Abdullah Mohammed Rashid, Aqeel A. Yaseen, Hamid Ali Abed Al-Asadi, Ahmed A. Alkadhmawee Multi-factor Authentication for an Administrator's Devices in an IoT Environment. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Waheed Ali H. M. Ghanem, Yousef A. Baker El-Ebiary, Mohamed Abdulnabi, Mohammad Tubishat, Nayef Abdulwahab Mohammed Alduais, Abdullah B. Nasser, Nibras Abdullah, Ola Ahmed Al-wesabi Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nazrool Omar, Selvakumar Manickam Rule-Based SLAAC Attack Detection Mechanism. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Collins Uchenna Chimeleze, Norziana Jamil, Roslan Ismail, Kwok-Yan Lam A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1W. Q. Janie Lee, Thian Song Ong, Tee Connie, H. T. Jackson Finger Vein Presentation Attack Detection with Optimized LBP Variants. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ranil Lee Kotalawela, Jun Hong Lee, Wan Wah Chuah, Kai Wen Luo, Lokman Mohd Fadzil Proposal for Physiological-Resilience Usability Model in Security-Enhanced Mobile Application for Secure Travel. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tee Wee Jing, Raja Kumar Murugesan Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shatha A. Baker, Ahmed S. Nori Internet of Things Security: A Survey. Search on Bibsonomy ACeS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahmed M. Elmisery, Mirela Sertovic Privacy Preserving Threat Hunting in Smart Home Environments. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Philip Lebedev, Konstantin Kogos, Egor Vasilenko On Way to Simplify the Reverse Engineering of UEFI Firmwares. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yichiet Aun, Ming-Lee Gan, Yen-Min Jasmina Khaw Automatic Attendance Taking: A Proof of Concept on Privacy Concerns in 802.11 MAC Address Probing. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhen-Kai Wong, Swee-Huay Heng Blockchain-Based Image Sharing Application. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ji-Jian Chin, Yvonne Hwei-Syn Kam, Vik Tor Goh Vulnerabilities in Online Food Ordering Website. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Christine Lim Xin Yi, Zarul Fitri Zaaba, Mohamad Amar Irsyad Mohd Aminuddin Appraisal on User's Comprehension in Security Warning Dialogs: Browsers Usability Perspective. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hala A. Albaroodi, Mohammed Abomaali, Selvakumar Manickam Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Syeda Mariam Muzammal, Raja Kumar Murugesan A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Vasaki Ponnusamy, Chan Mee Yee, Adnan Bin Amanat Ali Mobile Authentication Using Tapping Behavior. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, Ammar Almomani Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abdullah Ahmed Bahashwan, Mohammed Anbar, Sabri M. Hanshi Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Siti-Farhana Lokman, Abu Talib Othman, Muhamad-Husaini Abu-Bakar, Shahrulniza Musa The Impact of Different Feature Scaling Methods on Intrusion Detection for in-Vehicle Controller Area Network (CAN). Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yean Li Ho, Siong-Hoe Lau, Afizan Azman Comparison Between BlindLogin and Other Graphical Password Authentication Systems. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh Proof of Bid as Alternative to Proof of Work. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alhamza Munther, Imad J. Mohammed, Mohammed Anbar, Anwer Mustafa Hilal Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification. Search on Bibsonomy ACeS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 111 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license