FairAccess: a new Blockchain‐based access control framework for the Internet of Things
Ouaddah, Aafaf, Abou Elkalam, Anas, Ait Ouahman, Abdellah
Published in Security and communication networks (01.12.2016)
Published in Security and communication networks (01.12.2016)
Get full text
Journal Article
A DDoS Attack Detection Method Based on SVM in Software Defined Network
Feng, Luting, Zhu, Jian, Cheng, Xiangyang, Ye, Jin, Song, Ling
Published in Security and communication networks (01.01.2018)
Published in Security and communication networks (01.01.2018)
Get full text
Journal Article
Performance Analysis of Hyperledger Fabric Platforms
Nassif, Ali Bou, Abu Talib, Manar, Qasse, Ilham A., Nasir, Qassim
Published in Security and communication networks (01.01.2018)
Published in Security and communication networks (01.01.2018)
Get full text
Journal Article
Security and Privacy in the Medical Internet of Things: A Review
Fang, Shengqun, Liu, Fang, Li, Yangyang, Cai, Z., Sun, Wencheng, Wang, Guoyan
Published in Security and communication networks (01.01.2018)
Published in Security and communication networks (01.01.2018)
Get full text
Journal Article
Software‐defined networking (SDN): a survey
Benzekki, Kamal, El Fergougui, Abdeslam, Elbelrhiti Elalaoui, Abdelbaki
Published in Security and communication networks (01.12.2016)
Published in Security and communication networks (01.12.2016)
Get full text
Journal Article
Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning
Vargas-Solar, Genoveva, de Medeiros Brito Junior, Agostinho, Silveira, Frederico A. F., Lima Filho, Francisco Sales de, Silveira, Luiz F. Q.
Published in Security and communication networks (13.10.2019)
Published in Security and communication networks (13.10.2019)
Get full text
Journal Article
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security
Cao, ChunHua, Tang, YaNa, Huang, DeYan, Gan, WeiMin, Zhang, Chunjiong
Published in Security and communication networks (2021)
Published in Security and communication networks (2021)
Get full text
Journal Article
Privacy in the Internet of Things: threats and challenges
Ziegeldorf, Jan Henrik, Morchon, Oscar Garcia, Wehrle, Klaus
Published in Security and communication networks (01.12.2014)
Published in Security and communication networks (01.12.2014)
Get full text
Journal Article
Deep Learning for Intrusion Detection and Security of Internet of Things (IoT): Current Analysis, Challenges, and Possible Solutions
Khan, Amjad Rehman, Kashif, Muhammad, Jhaveri, Rutvij H., Raut, Roshani, Saba, Tanzila, Bahaj, Saeed Ali
Published in Security and communication networks (09.07.2022)
Published in Security and communication networks (09.07.2022)
Get full text
Journal Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Jiang, Jianmin, Janicke, Helge, Maglaras, Leandros A., Ferrag, Mohamed Amine, Shu, Lei
Published in Security and communication networks (01.01.2017)
Published in Security and communication networks (01.01.2017)
Get full text
Journal Article
Steganalysis of least significant bit matching using multi-order differences
Xia, Zhihua, Wang, Xinhui, Sun, Xingming, Wang, Baowei
Published in Security and communication networks (01.08.2014)
Published in Security and communication networks (01.08.2014)
Get full text
Journal Article
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications
Ali, Elmustafa Sayed, Hasan, Mohammad Kamrul, Hassan, Rosilah, Saeed, Rashid A., Hassan, Mona Bakri, Islam, Shayla, Nafi, Nazmus Shaker, Bevinakoppa, Savitri
Published in Security and communication networks (2021)
Published in Security and communication networks (2021)
Get full text
Journal Article
Multi-region Nonuniform Brightness Correction Algorithm Based on L-Channel Gamma Transform
Qi, Min, Cui, Shanshan, Chang, Xin, Xu, Yuelei, Meng, Hongying, Wang, Yi, Yin, Ting
Published in Security and communication networks (23.04.2022)
Published in Security and communication networks (23.04.2022)
Get full text
Journal Article
Rational Protocols and Attacks in Blockchain System
Yang, Yixian, Yu, Xiaomei, Zhu, Haojia, Zhao, Minghao, Wang, Yilei, Wang, Yanli, Chen, Yuling, Li, Tao, Tian, Youliang
Published in Security and communication networks (24.09.2020)
Published in Security and communication networks (24.09.2020)
Get full text
Journal Article