Search

Your search keyword '"William J. Buchanan"' showing total 615 results

Search Constraints

Start Over You searched for: Author "William J. Buchanan" Remove constraint Author: "William J. Buchanan"
615 results on '"William J. Buchanan"'

Search Results

1. A True Random Number Generator Based on Race Hazard and Jitter of Braided and Cross-Coupled Logic Gates Using FPGA

2. Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks

3. SkipGateNet: A Lightweight CNN-LSTM Hybrid Model With Learnable Skip Connections for Efficient Botnet Attack Detection in IoT

4. Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection

5. Chromium Selectively Accumulates in the Rat Hippocampus after 90 Days of Exposure to Cr(VI) in Drinking Water and Induces Age- and Sex-Dependent Metal Dyshomeostasis

6. Female Rat Behavior Effects from Low Levels of Hexavalent Chromium (Cr[VI]) in Drinking Water Evaluated with a Toxic Aging Coin Approach

7. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

8. Privacy and Trust Redefined in Federated Machine Learning

9. LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments

10. A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect

11. CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

12. Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

13. DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

14. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

15. Attacking Windows Hello for Business: Is It What We Were Promised?

16. Using Social Media & Sentiment Analysis to Make Investment Decisions

17. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

18. A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks

19. MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features

20. Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

21. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

22. HDL-IDS: A Hybrid Deep Learning Architecture for Intrusion Detection in the Internet of Vehicles

23. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

24. Browsers’ Private Mode: Is It What We Were Promised?

25. A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT

26. A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

27. Top 10 Blockchain Predictions for the (Near) Future of Healthcare

28. A Comparative Analysis of Honeypots on Different Cloud Platforms

29. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

30. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

31. Privacy-Preserving Passive DNS

32. A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

33. Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

34. The Future Internet: A World of Secret Shares

Catalog

Books, media, physical & digital resources