Search

Your search keyword '"Mohamed Amine Ferrag"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Mohamed Amine Ferrag" Remove constraint Author: "Mohamed Amine Ferrag" Publisher ieee Remove constraint Publisher: ieee
25 results on '"Mohamed Amine Ferrag"'

Search Results

1. Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices

2. From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation

3. LLM-Based Edge Intelligence: A Comprehensive Survey on Architectures, Applications, Security and Trustworthiness

4. ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance

5. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning

6. Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment

7. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

8. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges

9. Security and Privacy in Fog Computing: Challenges

12. Reliability, Security and Privacy in Power Grids

14. Blockchain Technology: A case study in supply chain management

15. Digital Twins and Cyber Security – solution or challenge?

16. Network Countermeasure Selection Under Blockchain Based Privacy Preserving

17. Quantum Cryptography in Maritime Telecommunications

18. A Survey on Smart Agriculture: Development Modes, Technologies, and Security and Privacy Challenges

19. Between Location protection and Overthrowing: A Contrariness Framework Study for Smart Vehicles

20. Preserving the Location Privacy of Drivers Using Transmission Range Changing Techniques in Internet of Vehicles

21. A Robust Security Framework based on Blockchain and SDN for Fog Computing enabled Agricultural Internet of Things

22. The Impact of the Adversary's Eavesdropping Stations on the Location Privacy Level in Internet of Vehicles

23. Big IoT Data Indexing: Architecture, Techniques and Open Research Challenges

24. Taxonomy of Biometric-based Authentication Schemes for Mobile Computing Devices

25. Privacy-preserving Schemes for Fog-based IoT Applications: Threat models, Solutions, and Challenges

Catalog

Books, media, physical & digital resources