70 results on '"Rezvani, Mohsen"'
Search Results
52. Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks
53. Anomaly-free policy composition in software-defined networks
54. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
55. Trust-Based Data Aggregation for WSNs in the Presence of Faults and Collusion Attacks
56. A Collaborative Reputation System Based on Credibility Propagation in WSNs
57. Interdependent Security Risk Analysis of Hosts and Flows
58. Method for providing secure and private fine-grained access to outsourced data
59. Speech enhancement using transient components in frequency domain
60. A trust assessment framework for streaming data in WSNs using iterative filtering
61. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
62. Provenance-aware security risk analysis for hosts and network flows
63. MalwareMonitor
64. Provenance-aware security risk analysis for hosts and network flows
65. Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency
66. A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
67. Specification of channel codes types using the PSD and histogram attributes of the received signal
68. MIZAN: A secure E-voting schema with vote changeability
69. Analyzing and resolving anomalies in firewall security policies based on propositional logic
70. Spatio-temporal deep learning for EEG-fNIRS brain computer interface.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.