Loading…
Auditing Cache Data Integrity in the Edge Computing Environment
Li, Bo, He, Qiang, Chen, Feifei, Jin, Hai, Xiang, Yang, Yang, Yun
Published in IEEE transactions on parallel and distributed systems (01.05.2021)
Published in IEEE transactions on parallel and distributed systems (01.05.2021)
Get full text
Journal Article
Loading…
Loading…
Spacechain: A Three-Dimensional Blockchain Architecture for IoT Security
Du, Miao, Wang, Kun, Liu, Yinqiu, Qian, Kai, Sun, Yanfei, Xu, Wenyao, Guo, Song
Published in IEEE wireless communications (01.06.2020)
Published in IEEE wireless communications (01.06.2020)
Get full text
Journal Article
Loading…
Inside the Insider
Sanders, George Lawrence, Upadhyaya, Shambhu, Wang, Xunyi
Published in IEEE engineering management review (01.06.2019)
Published in IEEE engineering management review (01.06.2019)
Get full text
Journal Article
Loading…
Loading…
AdvFaces: Adversarial Face Synthesis
Deb, Debayan, Zhang, Jianbang, Jain, Anil K.
Published in IEEE International Conference on Biometrics, Theory, Applications and Systems (28.09.2020)
Published in IEEE International Conference on Biometrics, Theory, Applications and Systems (28.09.2020)
Get full text
Conference Proceeding
Loading…
Designing Digital Literacy Activities: An Interdisciplinary and Collaborative Approach
Julie, Henry, Alyson, Hernalesteen, Anne-Sophie, Collard
Published in Proceedings - Frontiers in Education Conference (21.10.2020)
Published in Proceedings - Frontiers in Education Conference (21.10.2020)
Get full text
Conference Proceeding
Loading…
Vulnerability Analysis of Cyber Physical Systems Under False-Data Injection and Disturbance Attacks
Gerard, Benjamin, Rebai, Souad Bezzaoucha, Voos, Holger, Darouach, Mohamed
Published in Proceedings (IEEE International Conference on Emerging Technologies and Factory Automation) (01.09.2018)
Published in Proceedings (IEEE International Conference on Emerging Technologies and Factory Automation) (01.09.2018)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Ethics and Security in the Digital World: Recommendations for Cybersecurity Strategies and Practices in Türkiye
Ozarpa, Cevat, Avci, Isa, Khan, Yahya Zakrya
Published in 2025 9th International Symposium on Innovative Approaches in Smart Technologies (ISAS) (27.06.2025)
Published in 2025 9th International Symposium on Innovative Approaches in Smart Technologies (ISAS) (27.06.2025)
Get full text
Conference Proceeding
Loading…
Identifying the Factors in Reporting the Cost of a Hack
Carlson, Albert, Williams, Benjamin J, Mikkilineni, Sai Ranganath, Singh, Lieutenant Mandeep, Carlson, Ariana
Published in 2025 IEEE World AI IoT Congress (AIIoT) (28.05.2025)
Published in 2025 IEEE World AI IoT Congress (AIIoT) (28.05.2025)
Get full text
Conference Proceeding
Loading…
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces
Bessani, A.N., Correia, M., da Silva Fraga, J., Lau Cheuk Lung
Published in IEEE transactions on parallel and distributed systems (01.03.2009)
Published in IEEE transactions on parallel and distributed systems (01.03.2009)
Get full text
Journal Article
Loading…
Cyber Security and Vulnerability Analysis of Networked Control System subject to False-Data injection
Gerard, Benjamin, Rebai, Souad Bezzaoucha, Voos, Holger, Darouach, Mohamed
Published in 2018 Annual American Control Conference (ACC) (01.06.2018)
Published in 2018 Annual American Control Conference (ACC) (01.06.2018)
Get full text
Conference Proceeding
Loading…
Ensuring Web Application Security: An OWASP Driven Development Methodology
Sakthivel, M., Sivanantham, S., Bharathiraja, N., Bala Krishna, N., Kamalraj, R., Kumar, V. Saravana
Published in 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS) (18.04.2024)
Published in 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS) (18.04.2024)
Get full text
Conference Proceeding
Loading…
Probabilistic Security Risk Assessment of Systems Subject to Sequential Attacks
Liu, Qisi, Xing, Liudong, Zhou, Chengcheng, Wang, Yujie
Published in 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS) (01.10.2018)
Published in 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS) (01.10.2018)
Get full text
Conference Proceeding
Loading…
Finding DDoS attack sources: Searchlight localization algorithm for network tomography
Demir, Omer, Khan, Bilal
Published in 2011 7th International Wireless Communications and Mobile Computing Conference (01.07.2011)
Published in 2011 7th International Wireless Communications and Mobile Computing Conference (01.07.2011)
Get full text
Conference Proceeding
Loading…
A Study on Secret Data Sharing through Coverless Steganography
Debnath, Sourabh, Mohapatra, Ramesh Kumar
Published in The ... CSI International Symposium on Artificial Intelligence & Signal Processing (Online) (12.02.2022)
Published in The ... CSI International Symposium on Artificial Intelligence & Signal Processing (Online) (12.02.2022)
Get full text
Conference Proceeding