Cybersecurity, Vol. 4, 2021
1.) An end-to-end text spotter with text relation networks. --Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li and Weiqing Huang.
2.) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. --Ansam Khraisat and Ammar Alazab.
3.) Neutron: an attention-based neural decompiler. --Ruigang Liang, Ying Cao, Peiwei Hu and Kai Chen.
4.) Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices. --Shafi Ullah and Raja Zahilah.
5.) An efficient hybrid system for anomaly detection in social networks. --Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee.
6.) Cascading effects of cyber-attacks on interconnected critical infrastructure. --Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra and Aditya Mathur.
7.) A PLS blockchain for IoT applications: protocols and architecture. --Alex Shafarenko.
8.) A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. --Runchen Gao, Shen Li, Yuqi Gao and Rui Guo.
9.) Efficient functional encryption for inner product with simulation-based security. --Wenbo Liu, Qiong Huang, Xinjian Chen and Hongbo Li.
10.) A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid. --Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu and Yonghong Zhang.
2.) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. --Ansam Khraisat and Ammar Alazab.
3.) Neutron: an attention-based neural decompiler. --Ruigang Liang, Ying Cao, Peiwei Hu and Kai Chen.
4.) Curve25519 based lightweight end-to-end encryption in resource constrained autonomous 8-bit IoT devices. --Shafi Ullah and Raja Zahilah.
5.) An efficient hybrid system for anomaly detection in social networks. --Md. Shafiur Rahman, Sajal Halder, Md. Ashraf Uddin and Uzzal Kumar Acharjee.
6.) Cascading effects of cyber-attacks on interconnected critical infrastructure. --Venkata Reddy Palleti, Sridhar Adepu, Vishrut Kumar Mishra and Aditya Mathur.
7.) A PLS blockchain for IoT applications: protocols and architecture. --Alex Shafarenko.
8.) A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. --Runchen Gao, Shen Li, Yuqi Gao and Rui Guo.
9.) Efficient functional encryption for inner product with simulation-based security. --Wenbo Liu, Qiong Huang, Xinjian Chen and Hongbo Li.
10.) A renewable energy forecasting and control approach to secured edge-level efficiency in a distributed micro-grid. --Raphael Anaadumba, Qi Liu, Bockarie Daniel Marah, Francis Mawuli Nakoty, Xiaodong Liu and Yonghong Zhang.
Jiang, Jianguo - Personal Name
Liu, Wenbo - Personal Name
Gao, Runchen - Personal Name
Shafarenko, Alex - Personal Name
Palleti, Venkata Reddy - Personal Name
Rahman, Md. Shafiur - Personal Name
Ullah, Shafi - Personal Name
Liang, Ruigang - Personal Name
Khraisat, Ansam - Personal Name
Anaadumba, Raphael - Personal Name
Liu, Wenbo - Personal Name
Gao, Runchen - Personal Name
Shafarenko, Alex - Personal Name
Palleti, Venkata Reddy - Personal Name
Rahman, Md. Shafiur - Personal Name
Ullah, Shafi - Personal Name
Liang, Ruigang - Personal Name
Khraisat, Ansam - Personal Name
Anaadumba, Raphael - Personal Name
Vol. 4, 2021
2523-3246
e-Journal TI
Inggris
Springer Nature
2021
United Kingdom
LOADING LIST...
LOADING LIST...