Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluationAamir, Muhammad ; Zaidi, Syed Mustafa AliInternational journal of information security, 2019-12, Vol.18 (6), p.761-785 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
2 |
Material Type: magazinearticle
|
![]() |
Designing concurrent and distributed control systemsAarsten, Amund ; Brugali, Davide ; Menga, GiuseppeCommunications of the ACM, 1996-10, Vol.39 (10), p.50-58New York: Association for Computing MachineryTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Computing Graph Neural Networks: A Survey from Algorithms to AcceleratorsAbadal, Sergi ; Jain, Akshay ; Guirado, Robert ; López-Alonso, Jorge ; Alarcón, EduardACM computing surveys, 2022-12, Vol.54 (9), p.1-38 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Analyzing security protocols with secrecy types and logic programsABADI, Martin ; BLANCHET, BrunoJournal of the ACM, 2005, Vol.52 (1), p.102-146 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Security Analysis of Cryptographically Controlled Access to XML DocumentsABADI, Martin ; WARINSCHI, BogdanJournal of the ACM, 2008-05, Vol.55 (2), p.1-29 [Periódico revisado por pares]New York, NY: Association for Computing MachineryTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
A framework for establishing trust in Cloud provenanceAbbadi, Imad M.International journal of information security, 2013-04, Vol.12 (2), p.111-128 [Periódico revisado por pares]Berlin/Heidelberg: Springer-VerlagTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
A survey on context-aware recommender systems based on computational intelligence techniquesAbbas, Assad ; Zhang, Limin ; Khan, Samee U.Computing, 2015-07, Vol.97 (7), p.667-690 [Periódico revisado por pares]Vienna: Springer ViennaTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Radio frequency fingerprinting techniques for device identification: a surveyAbbas, Sohail ; Abu Talib, Manar ; Nasir, Qassim ; Idhis, Sally ; Alaboudi, Mariam ; Mohamed, AliInternational journal of information security, 2024-04, Vol.23 (2), p.1389-1427 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Detection of firewall configuration errors with updatable treeAbbes, Tarek ; Bouhoula, Adel ; Rusinowitch, MichaëlInternational journal of information security, 2016-06, Vol.15 (3), p.301-317 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A novel selfish node detection based on reputation and game theory in Internet of ThingsAbdi, Gholam Hossein ; Sheikhani, Amir Hossein Refahi ; Kordrostami, Sohrab ; Ghane, Armin ; Babaie, ShahramComputing, 2024, Vol.106 (1), p.81-107 [Periódico revisado por pares]Vienna: Springer ViennaTexto completo disponível |