Search

Your search keyword '"Mohamed Amine Ferrag"' showing total 281 results

Search Constraints

Start Over You searched for: Author "Mohamed Amine Ferrag" Remove constraint Author: "Mohamed Amine Ferrag"
281 results on '"Mohamed Amine Ferrag"'

Search Results

1. Deep learning for cyber threat detection in IoT networks: A review

2. Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models

3. Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices

4. From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation

5. LLM-Based Edge Intelligence: A Comprehensive Survey on Architectures, Applications, Security and Trustworthiness

6. Eye-Net: A Low-Complexity Distributed Denial of Service Attack-Detection System Based on Multilayer Perceptron

7. Digitization of healthcare sector: A study on privacy and security concerns

8. ESASCF: Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance

9. IoT: Communication protocols and security threats

10. A novel autonomous container-based platform for cybersecurity training and research

11. Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning

12. Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment

13. Intrusion Detection in Critical Infrastructures: A Literature Review

14. A Novel Authentication Method That Combines Honeytokens and Google Authenticator

15. Efficient Method for Continuous IoT Data Stream Indexing in the Fog-Cloud Computing Level

17. Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

18. Security and privacy challenges in the field of iOS device forensics

19. A Safety-Aware Location Privacy-Preserving IoV Scheme with Road Congestion-Estimation in Mobile Edge Computing

20. Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges

21. Combining Security and Reliability of Critical Infrastructures: The Concept of Securability

22. A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems

23. A Heterogeneous Federated Transfer Learning Approach with Extreme Aggregation and Speed

25. Cyber security of critical infrastructures

26. A Survey on Big IoT Data Indexing: Potential Solutions, Recent Advancements, and Open Issues

27. Digital Transformation and Cybersecurity of Critical Infrastructures

28. A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks

29. WHISPER: A Location Privacy-Preserving Scheme Using Transmission Range Changing for Internet of Vehicles

30. PetroBlock: A Blockchain-Based Payment Mechanism for Fueling Smart Vehicles

31. Cyber Ranges and TestBeds for Education, Training, and Research

32. Security and Privacy in Fog Computing: Challenges

33. RDTIDS: Rules and Decision Tree-Based Intrusion Detection System for Internet-of-Things Networks

34. Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems

35. Threats, Countermeasures and Attribution of Cyber Attacks on Critical Infrastructures

36. A Novel Intrusion Detection Mechanism for SCADA systems which Automatically Adapts to Network Topology Changes

37. DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services

38. Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security

Catalog

Books, media, physical & digital resources