33 results on '"Fan, Wenjun"'
Search Results
2. Classification and Identification of Phishing Websites based on Machine Learning
3. A Chaotic Encryption Approach Improving Digital Image Security
4. Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based Encryption
5. A Measurement of Real-world Attack Connections toward Honeypots
6. The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network
7. A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking
8. ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking
9. Blockchain-based Secure Coordination for Distributed SDN Control Plane
10. Robust P2P Connectivity Estimation for Permissionless Bitcoin Network
11. A Generic Blockchain Framework to Secure Decentralized Applications
12. A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
13. Security Analyses of Misbehavior Tracking in Bitcoin Network
14. Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking
15. Performance Analyses for Applying Machine Learning on Bitcoin Miners
16. Power Allocation for Secrecy Rate Maximization in Secure UAV-Cooperative Communications
17. Blockchain-Enabled Collaborative Intrusion Detection in Software Defined Networks
18. Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
19. Reducing Mutual Coupling of Millimeter Wave Array Antennas by Fractal Defected Ground Structure
20. Design of Element for 5G Antenna Arrays with Step Impedance Resonator
21. Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
22. Design of Element for 5G Antenna Arrays with Step Impedance Resonator
23. An Architecture for Privacy-preserving Sharing of CTI with 3rd party Analysis Services
24. An architecture for privacy-preserving sharing of CTI with 3rd party analysis services
25. A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems
26. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design.
27. Enabling an Anatomic View to Investigate Honeypot Systems: A Survey.
28. Taxonomy of honeynet solutions
29. Using end-to-end data encryption to secure SIP device configuration
30. Three-state disk model for high quality and energy efficient streaming media servers
31. Technology independent honeynet description language.
32. Parallelization of RSA Algorithm Based on Compute Unified Device Architecture
33. Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.