41 results on '"Patriciu, Victor-Valeriu"'
Search Results
2. Reactive WiFi honeypot
3. SABRES - A Proof of Concept for Enhanced Cloud Qualified Electronic Signatures
4. Simulating RPL Attacks in 6lowpan for Detection Purposes
5. Internet of Things Traffic Characterization using flow and packet analysis
6. Energy Efficient Trust-Based Security Mechanism for Wireless Sensors and Unmanned Aerial Vehicles
7. Acceleration Techniques for Fully-Homomorphic Encryption Schemes
8. A Proposed Solution for Analyzing the Behavior of a WSN using a Secured Neural Network Approach
9. Applying Neural Network Approach to Homomorphic Encrypted Data
10. Trajectory influence on data collection in Wireless Sensor Networks using an Unmanned Aerial Vehicle
11. Mitigating DoS attacks in publish-subscribe IoT networks
12. Neural network models in big data analytics and cyber security
13. Authentication mechanism for data gathering protocol in wireless sensor networks
14. Feature Extraction and Visualization for Network PcapNg Traces
15. Achieving DDoS resiliency in a software defined network by intelligent risk assessment based on neural networks and danger theory
16. LightPcapNg: Implementing a library for general-purpose tracing based on PcapNg
17. A Participatory Verification security scheme for the Internet of Things
18. A Bio-cryptographic framework for securing mobile devices content
19. Performance of parallel ChaCha20 stream cipher
20. Deduplicated distributed file system using lightweight cryptography
21. Cyber Incident Response Aided by Neural Networks and Visual Analytics
22. Using OpenCL to Improve String Matching for Network Intrusion Detection
23. Cloud computing digital forensics framework for automated anomalies detection
24. Cyber Protection of Critical Infrastructures Using Supervised Learning
25. An evaluation of the Reed-Solomon error-correcting codes usage for bio-cryptographic algorithms
26. Methods of reducing bio-cryptographic algorithms computational complexity
27. Implementation of a cloud computing framework for cloud forensics
28. Bio-cryptographic authentication in cloud storage sharing
29. Intrusions detection based on Support Vector Machine optimized with swarm intelligence
30. Biologically inspired risk assessment in cyber security using neural networks
31. Spam host classification using swarm intelligence
32. Logging framework for cloud computing forensic environments
33. Beyond digital forensics. A cloud computing perspective over incident response and reporting
34. A new DRM architecture based on mobilel code and white-box encryption
35. Using MTMs to secure electronic signatures generation
36. On modeling and formally verifying secure explicit on-demand ad hoc routing protocols
37. Security analysis of Robust User Authentication Protocol
38. A structured approach for implementing cyber security exercises
39. The Viewpoint of E-Commerce Security in the Digital Economy
40. Towards Developing Secure Video Surveillance Systems over IP
41. Formal verification of G-PAKE using Casper/FDR2: Securing a group PAKE protocol using Casper/FDR2.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.