38 results on '"Hammi, Badis"'
Search Results
2. An End-to-End Approach for the Detection of Phishing Attacks
3. Addressing Security Challenges in Copyright Management Applications: The Blockchain Perspective
4. PKIs in C-ITS: Security functions, architectures and projects: A survey
5. Survey on smart homes: Vulnerabilities, risks, and countermeasures
6. A blockchain-based certificate revocation management and status verification system
7. A secure multipath reactive protocol for routing in IoT and HANETs
8. Blockchain Technology in the Healthcare Sector: Overview and Security Analysis
9. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
10. Security Threats, Countermeasures, and Challenges of Digital Supply Chains
11. Non-Fungible Tokens: A Review
12. Blockchain-Based Solution for Detecting and Preventing Fake Check Scams
13. Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper
14. A machine learning based approach for the detection of sybil attacks in C-ITS
15. PhishGNN: A Phishing Website Detection Framework using Graph Neural Networks
16. Software Supply-Chain Security: Issues and Countermeasures
17. A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
18. A Blockchain-based Lightweight Authentication Solution for IoT
19. Fake Check Scams: A Block Chain Based Detection Solution
20. An empirical investigation of botnet as a service for cyberattacks
21. CAM-Infrastructure: a novel solution for service advertise- ment in Cooperative Intelligent Transportation Systems
22. Internet of Things (IoT) Technologies for Smart Cities
23. Proposal of new solution for service advertisement for ETSI ITS environments: CAM-Infrastructure
24. Total Eclipse: How To Completely Isolate a Bitcoin Peer
25. An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach
26. Detecting Botclouds at Large Scale: A Decentralized and Robust Detection Method for Multi-Tenant Virtualized Environments
27. IoT technologiesfor smart cities
28. Using butterfly keys: A performance study of pseudonym certificates requests in C-ITS
29. CAM-Infrastructure: a novel solution for service advertisement in Cooperative Intelligent Transportation Systems
30. Securing PKI Requests for C-ITS Systems
31. ASN.1 Specification for ETSI Certificates and Encoding Performance Study
32. A collaborative approach for a source based detection of botclouds
33. Toward a Source Detection of Botclouds: A PCA-Based Approach
34. Understanding botclouds from a system perspective: A principal component analysis
35. A New Service Advertisement Message for ETSI ITS Environments: CAM-Infrastructure
36. Clustering methods comparison: Application to source based detection of botclouds
37. A Factorial Space for a System-Based Detection of Botcloud Activity
38. An empirical investigation of botnet as a service for cyberattacks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.