Search

Your search keyword '"Nikos Komninos"' showing total 41 results

Search Constraints

Start Over You searched for: Author "Nikos Komninos" Remove constraint Author: "Nikos Komninos" Topic business Remove constraint Topic: business
41 results on '"Nikos Komninos"'

Search Results

1. A Secure Integrated Framework for Fog-Assisted Internet-of-Things Systems

2. ForChaos: Real Time Application DDoS Detection Using Forecasting and Chaos Theory in Smart Home IoT Network

3. Preserving Privacy of Data with Efficient Attribute-based Encryption Schemes

4. BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users

5. A Study on the Evolution of Ransomware Detection Using Machine Learning and Deep Learning Techniques

6. Bio/nature-inspired algorithms in A.I. for malicious activity detection

7. Survey of approaches and features for the identification of HTTP-based botnet traffic

8. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks

9. Evaluating the Provision of Botnet Defences using Translational Research Concepts

10. A New Framework Architecture for Next Generation e-Health Services

11. LIDF: Layered intrusion detection framework for ad-hoc networks

12. Current and future threats framework in smart grid domain

13. Layered security design for mobile ad hoc networks

14. Security for 5G Communications

15. Privacy Preserving Attribute Based Encryption for Multiple Cloud Collaborative Environment

16. The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications

17. SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks

18. Ubiquitous Healthcare Profile Management Applying Smart Card Technology

19. Privacy-preserving scheme for mobile ad hoc networks

20. User dependent cryptography for security in future mobile telecommunication systems

21. PEA: Polymorphic Encryption Algorithm based on quantum computation

22. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

23. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

24. New client puzzle approach for DoS resistance in ad hoc Networks

25. A new framework for ubiquitous context-aware healthcare applications

26. Security in Smart Home Environment

27. PKI security in large-scale healthcare networks

28. Security for Ad Hoc Networks

30. Consistent Re-Clustering in Mobile Ad Hoc Networks

31. Efficient group key agreement & recovery in ad hoc networks

32. Protecting Biometric Templates with Image Watermarking Techniques

33. Intrusion Detection with Neural Networks and Watermarking Techniques for MANET

34. Authentication in a layered security approach for mobile ad hoc networks

35. Detecting unauthorized and compromised nodes in mobile ad hoc networks

36. Security enhancements for A5/1 without losing hardware efficiency in future mobile systems

37. An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices

38. Modified WAP for secure voice and video communication

39. Novel methods for enabling public key schemes in future mobile systems

40. Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes

41. Integrity mechanism for eHealth tele-monitoring system in smart home environment

Catalog

Books, media, physical & digital resources