345 results on '"You, Ilsun"'
Search Results
2. Towards secure asynchronous messaging with forward secrecy and mutual authentication
3. Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment
4. Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System
5. Deep transfer learning-based network traffic classification for scarce dataset in 5G IoT systems
6. Cyber security challenges in aviation communication, navigation, and surveillance
7. A Fault Tolerant Mechanism for UE Authentication in 5G Networks
8. Editorial: Security and Privacy in Computing and Communications
9. Smart collaborative distribution for privacy enhancement in moving target defense
10. Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol
11. DROpS: A demand response optimization scheme in SDN-enabled smart energy ecosystem
12. MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks
13. An Innovative Framework for Dynamic Traffic Lights Management Based on the Combined Use of Fuzzy Logic and Several Network Architectures
14. Shortest feasible paths with partial charging for battery-powered electric vehicles in smart cities
15. A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices.
16. SMDFbs: Specification-Based Misbehavior Detection for False Base Stations.
17. GRBC-based Network Security Functions placement scheme in SDS for 5G security
18. Resource-based mobility management for video users in 5G using catalytic computing
19. Secure and efficient protocol for fast handover in 5G mobile Xhaul networks
20. Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution : Extended Abstract
21. SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks
22. Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles
23. Enabling in-network aggregation by diffusion units for urban scale M2M networks
24. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
25. 5G wireless P2MP backhaul security protocol: an adaptive approach
26. An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network.
27. Online data caching in edge computing.
28. Approaching green sensor field using queue-based optimization technique
29. A security gateway application for End-to-End M2M communications
30. New order preserving encryption model for outsourced databases in cloud environments
31. APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.
32. Payment-based incentive mechanism for secure cloud deduplication
33. A software classification scheme using binary-level characteristics for efficient software filtering
34. Detecting and preventing selfish behaviour in mobile ad hoc network
35. Towards cost efficient mobile service and information management in ubiquitous environment with cloud resource scheduling
36. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
37. Probabilistic spatio-temporal inference for motion event understanding
38. Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution
39. Long-term location privacy protection for location-based services in mobile cloud computing
40. Special issue on security and privacy techniques in mobile cloud computing
41. Hierarchical DHT and proportional replication based mobility management for large-scale mobile Internet
42. An efficient classification approach for large-scale mobile ubiquitous computing
43. Decentralized Policy Coordination in Mobile Sensing with Consensual Communication.
44. Machine Learning Based Signaling DDoS Detection System for 5G Stand Alone Core Network.
45. A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.
46. ACSP: A novel security protocol against counting attack for UHF RFID systems
47. An efficient deadlock prevention approach for service oriented transaction processing
48. Intelligent healthcare service based on context inference using smart device
49. An Optimization-Based Scheme for Efficient Virtual Machine Placement
50. Soft computing for security services in smart and ubiquitous environments
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.