Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Artigo
|
![]() |
A dynamic C-V2X anonymous authentication and group key agreement protocolCui, Beibei ; He, Wei ; Cui, YanInternational journal of information security, 2024-06 [Periódico revisado por pares]Texto completo disponível |
12 |
Material Type: Artigo
|
![]() |
Email bombing attack detection and mitigation using machine learningShukla, Sanjeev ; Misra, Manoj ; Varshney, GauravInternational journal of information security, 2024-06 [Periódico revisado por pares]Texto completo disponível |
13 |
Material Type: Artigo
|
![]() |
Automatic detection and classification of leukocytes using convolutional neural networksZhao, Jianwei ; Zhang, Minshu ; Zhou, Zhenghua ; Chu, Jianjun ; Cao, FeilongMedical & biological engineering & computing, 2017-08, Vol.55 (8), p.1287-1301 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
14 |
Material Type: Artigo
|
![]() |
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applicationsBrowne, Thomas Oakley ; Abedin, Mohammad ; Chowdhury, Mohammad Jabed MorshedInternational journal of information security, 2024-06 [Periódico revisado por pares]Texto completo disponível |
15 |
Material Type: Artigo
|
![]() |
A compliance-based ranking of certificate authorities using probabilistic approachesJunaid, Kashif ; Janjua, Muhammad Umar ; Qadir, JunaidInternational journal of information security, 2024-05 [Periódico revisado por pares]Texto completo disponível |
16 |
Material Type: Artigo
|
![]() |
IoT cybersecurity in 5G and beyond: a systematic literature reviewPirbhulal, Sandeep ; Chockalingam, Sabarathinam ; Shukla, Ankur ; Abie, HabtamuInternational journal of information security, 2024-05 [Periódico revisado por pares]Texto completo disponível |
17 |
Material Type: Artigo
|
![]() |
Model-Agnostic Utility-Preserving Biometric Information AnonymizationChen, Chun-Fu ; Moriarty, Bill ; Hu, Shaohan ; Moran, Sean ; Pistoia, Marco ; Piuri, Vincenzo ; Samarati, PierangelaInternational journal of information security, 2024-05 [Periódico revisado por pares]Texto completo disponível |
18 |
Material Type: Artigo
|
![]() |
Malware analysis using visualized images and entropy graphsHan, Kyoung Soo ; Lim, Jae Hyun ; Kang, Boojoong ; Im, Eul GyuInternational journal of information security, 2015-02, Vol.14 (1), p.1-14 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
19 |
Material Type: Artigo
|
![]() |
Cyber security in New Space: Analysis of threats, key enabling technologies and challengesManulis, M. ; Bridges, C. P. ; Harrison, R. ; Sekar, V. ; Davis, A.International journal of information security, 2021-06, Vol.20 (3), p.287-311 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
20 |
Material Type: Artigo
|
![]() |
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domainsZia, Unsub ; McCartney, Mark ; Scotney, Bryan ; Martinez, Jorge ; AbuTair, Mamun ; Memon, Jamshed ; Sajjad, AliInternational journal of information security, 2022-08, Vol.21 (4), p.917-935 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |