Printer Friendly

Articles from Security and Communication Networks (September 30, 2019)

1-11 out of 11 article(s)
Title Author Type Words
A Data-Driven Approach to Cyber Risk Assessment. Santini, Paolo; Gottardi, Giuseppe; Baldi, Marco; Chiaraluce, Franco 6390
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection. Shen, Yanping; Zheng, Kangfeng; Wu, Chunhua; Yang, Yixian 6058
A Novel Trust Model Based on Node Recovery Technique for WSN. Qi, Ping; Wang, Fucheng; Hong, Shu 7835
A Secure and Efficient ECC-Based Anonymous Authentication Protocol. Wang, Feifei; Xu, Guoai; Gu, Lize 10660
Big Data Analytics for Cyber Security. Angin, Pelin; Bhargava, Bharat; Ranchal, Rohit 1444
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. Yin, Mingyong; Chen, Xingshu; Wang, Qixu; Wang, Wei; Wang, Yulong 7264
Evaluating the Impact of Name Resolution Dependence on the DNS. Xu, Haiyan; Zhang, Zhaoxin; Yan, Jianen; Ma, Xin 7432
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN. Caprolu, Maurantonio; Raponi, Simone; Pietro, Roberto Di 11722
Generative Reversible Data Hiding by Image-to-Image Translation via GANs. Zhang, Zhuo; Fu, Guangyuan; Di, Fuqiang; Li, Changlong; Liu, Jia 5380
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions. Emura, Keita; Hanaoka, Goichiro; Kawai, Yutaka; Matsuda, Takahiro; Ohara, Kazuma; Omote, Kazumasa; S 34114
Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks. Gao, Yunpeng; Zhang, Nan Report 13475

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters