Search

Your search keyword '"Choo, Kim-Kwang Raymond"' showing total 104 results

Search Constraints

Start Over You searched for: Author "Choo, Kim-Kwang Raymond" Remove constraint Author: "Choo, Kim-Kwang Raymond" Topic internet of things Remove constraint Topic: internet of things
104 results on '"Choo, Kim-Kwang Raymond"'

Search Results

2. A privacy protection scheme for green communication combining digital steganography.

3. Data Sharing and Privacy for Patient IoT Devices Using Blockchain

7. AI-enabled IoT penetration testing: state-of-the-art and research challenges.

8. efficient IoT forensic approach for the evidence acquisition and analysis based on network link.

9. Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings.

10. Prediction-Based Resource Deployment and Task Scheduling in Edge-Cloud Collaborative Computing.

11. Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks.

12. Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment.

13. Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices.

14. The need for Internet of Things digital forensic black‐boxes.

15. Editorial: Blockchain Ecosystem—Technological and Management Opportunities and Challenges.

16. An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.

17. A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.

18. A multiview learning method for malware threat hunting: windows, IoT and android as case studies.

19. Authenticated key agreement scheme for fog-driven IoT healthcare system.

20. Blockchain-enabled secure communications in smart cities.

21. Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud.

22. BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.

23. Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".

24. An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.

25. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.

26. Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.

27. Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.

28. A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.

29. Editorial: Security and Privacy in Internet of Things.

31. Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.

32. The VOCODES Kill Chain for Voice Controllable Devices

33. An opcode‐based technique for polymorphic Internet of Things malware detection.

34. Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.

36. Efficient and secure searchable encryption protocol for cloud-based Internet of Things.

38. Towards Evaluating the Effectiveness of Botnet Detection Techniques

39. Generalizing Supervised Learning for Intrusion Detection in IoT Mesh Networks

43. Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.

44. Identifying Vulnerabilities in Security and Privacy of Smart Home Devices

45. Wireless Sensor Network Topology Research on Internet of Things Model

46. Current School Sports Intelligence System Based on Artificial Intelligence and Internet of Things Technology

47. Construction of Smart Service Platform in the Perspective of Smart City Development

48. The Application of Computer Internet of Things in Modern Agricultural Planting Management

49. Coordinate-based efficient indexing mechanism for intelligent IoT systems in heterogeneous edge computing.

50. FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.

Catalog

Books, media, physical & digital resources