Software Security Research Topics Ideas [MS PhD]

List of Research Topics and Ideas of Software Security for MS and Ph.D. Thesis.

  1. A hierarchical model for quantifying software security based on static analysis alerts and software metrics
  2. An Approach to Improving Software Security Through Access Control for Data in Programs
  3. Moderator Factors of Software Security and Performance Verification
  4. A survey and classification of the security anomaly detection mechanisms in software defined networks
  5. Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks
  6. Measuring and modeling software vulnerability security advisory platforms
  7. A security pattern detection framework for building more secure software
  8. Managing Security-Risks for Improving Security-Durability of Institutional Web-Applications: Design Perspective
  9. Open Chance and Risk Management Process Supported by a Software Tool for Improving Urban Security
  10. Software-defined network (SDN) architecture and security considerations for 5G communications
  11. CSPM: Metamodel for Handling Security and Privacy Knowledge in Cloud Service Development
  12. Software-defined networking and architecture of iot with security, challenges and applications: A survey
  13. Research on Network Security Risk and Security Countermeasures of 5G Technology in Power System Application
  14. Detection and Prevention from DDoS Attack Using Software-Defined Security
  15. Choosing the Weapon: A Comparative Study of Security Analyzers for Android Applications
  16. Software Deception Steering through Version Emulation
  17. Finding Software Bugs in Embedded Devices
  18. Preliminary Study On It Security Maintenance Management In Malaysia Organizations
  19. A survey on intrusion detection system for software defined networks (SDN)
  20. Enhance Web Application Security Using Obfuscation
  21. Investigating the Interaction between Energy Consumption, Quality of Service, Reliability, Security, and Maintainability of Computer Systems and Networks
  22. Identification of Security Requirements from the Selected Set of Requirements under Fuzzy Environment
  23. Information Security in Software-Defined Network
  24. IoT-Enabled Agricultural System Application, Challenges and Security Issues
  25. Risk assessment method for IoT software supply chain vulnerabilities
  26. Security smells in ansible and chef scripts: A replication study
  27. Quantitative System-Level Security Verification of the IoV Infrastructure
  28. Measuring Security: A Step Towards Enhancing Security of System
  29. CompTIA security+ guide to network security fundamentals
  30. Security trends in Internet of Things: a survey
  31. Sysevr: A framework for using deep learning to detect software vulnerabilities
  32. A perspective on using blockchain for ensuring security in smart card systems
  33. Trusted Enforcement of Application-specific Security Policies
  34. A new enhanced cyber security framework for medical cyber physical systems
  35. A study of security challenges from a federeated cloud perspective
  36. Current security issues in the information society
  37. Security Audit of a Blockchain-Based Industrial Application Platform
  38. A Zero Trust Hybrid Security and Safety Risk Analysis Method
  39. Vehicle Speed Control and Security System
  40. Integration of Security Standards in DevOps Pipelines: An Industry Case Study
  41. Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm
  42. 10 Information security management in the cloud computing environment
  43. Wireless Network Security using RF Fingerprinting
  44. The Only Rule-Software Wins
  45. Systematic mutation-based evaluation of the soundness of security-focused android static analysis techniques
  46. Internet of Things: Enabling Technologies, Security and Social Implications
  47. BugMiner: Mining the Hard-to-Reach Software Vulnerabilities through the Target-Oriented Hybrid Fuzzer
  48. A survey on security and privacy of federated learning
  49. Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry
  50. Blockchain-Enabled Collaborative Intrusion Detection in Software Defined Networks
  51. User Experience Design for E-Voting: How mental models align with security mechanisms
  52. Cloud Computing Offered Capabilities: Threats to Software Vendors
  53. A fine-grained classification and security analysis of web-based virtual machine vulnerabilities
  54. A Large-Scale Interview Study on Information Security in and Attacks against Small and Medium-sized Enterprises
  55. The android platform security model
  56. Applying Software Defined Network Concepts for Securing the Client Data Signals Over the Optical Transport Network of Egypt
  57. A Case for Unikernels in IoT: Enhancing Security and Performance
  58. Islands of (in) security in the Anthropocene
  59. Present and Future of Network Security Monitoring
  60. A Systematic Review of the State of Cyber-Security in Water Systems
  61. Cyber-Security of Smart Microgrids: A Survey
  62. Cybersecurity knowledge and skills taught in capture the flag challenges
  63. Cloud Computing Security Challenges, Threats and Vulnerabilities
  64. Modeling and Analysis of Security in Design Phase of IoT Based Applications Using Security Patterns
  65. Discuss the Security Countermeasures and Data Protection of Library Computer Network
  66. Smartphone security and forensic analysis
  67. A Home Security Camera System Based on Cloud and SNS
  68. Design and Implementation of Virtual Security Function Based on Multiple Enclaves
  69. Towards ASM-based automated formal verification of security protocols
  70. Directed Test Generation for Activation of Security Assertions in RTL Models
  71. Privacy and security in connected hearing healthcare
  72. Security Threats and Their Mitigations in IoT Devices
  73. Innovative Solutions for Ensuring Information Security of Modern Enterprises
  74. A comprehensive study on security in IoT and resolving security threats using machine learning (ML)
  75. SE: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android
  76. Azure Network Security Configuration
  77. DPLOOP: Detection and Prevention of Loopholes in Web Application Security
  78. Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies
  79. Collaborative Edge Computing for Smart Villages [Energy and Security]
  80. Cyber security training for critical infrastructure protection: A literature review
  81. Dual-Layer Security and Access System to Prevent the Spread of COVID-19
  82. Digital Health Data and Data Security
  83. Behavioral information security: Defining the criterion space
  84. Proof-of-PUF enabled Blockchain: concurrent data and device security for Internet-of-Energy
  85. IoT Dynamic Log File Analysis: Security Approach for Anomaly Detection In Multi Sensor Environment
  86. IoT: Security Attacks and Countermeasures
  87. Performance Evaluation of Attribute-Based Encryption in Automotive Embedded Platform for Secure Software Over-The-Air Update
  88. Network Security Policy for Higher Education Institutions based on ISO Standards
  89. Assessing the Security of Campus Networks: The Case of Seven Universities
  90. Internet of Things backdoors: Resource management issues, security challenges, and detection methods
  91. Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability
  92. Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
  93. A review on architecture and models for autonomic software systems
  94. Scalability, Consistency, Reliability and Security in SDN Controllers: A Survey of Diverse SDN Controllers
  95. Secure access of resources in software-defined networks using dynamic access control list
  96. On the relationship between it privacy and security behavior: A survey among german private users
  97. Mitigating Security Challenges in Smart Home Management Through Smart Lock
  98. Power Distance as a Variable in Assessing Employees’ Behavior towards Information Security Policy Compliance in a High-Power Distance Society: An …
  99. Detecting Insider Threat via a Cyber-Security Culture Framework
  100. Cloud Computing Security: Hardware-Based Attacks and Countermeasures
  101. IoT data security with DNA-genetic algorithm using blockchain technology
  102. A Design of Improvement Method of Central Patch Controlled Security Platform Using Blockchain
  103. Method for Intelligent Information Processing Using Software Reuse Library and Blockchain Architecture
  104. Home automation system for security and temperature control using microcontroller based with smartphone applications
  105. Overview of Five Techniques Used for Security and Privacy Insurance in Smart Cities
  106. Reducing Cybersecurity Vulnerabilities Through the Use of 12N QR Codes
  107. Risks and security solutions existing in the Internet of things (IoT) in relation to Big Data
  108. A survey of Intel SGX and its applications
  109. Security Issues in Cloud Computing: A Review
  110. Fuzzy cognitive modeling of product import and export impacts on food security
  111. Cognitive Radio Network-Based Design and Security Challenges in 5G Communication
  112. Smart Factory Security: A Case Study on a Modular Smart Manufacturing System
  113. Understanding the Quality of Container Security Vulnerability Detection Tools
  114. In-Vehicle Cyber Security
  115. Toward Inclusion of Children as Software Engineering Stakeholders
  116. Extended Security in Heterogeneous Distributed SDN Architecture
  117. Cloud and Edge Computing Security Challenges, Demands, Known Threats, and Vulnerabilities
  118. Secure Transactions Management Using Blockchain as a Service Software for the Internet of Things
  119. Probabilistic Estimation of Threat Intrusion in Embedded Systems for Runtime Detection
  120. Design and Implementation of Virtual Security Function Based on Multiple Enclaves. Future Internet 2021, 13, 12
  121. An efficient lightweight cryptographic algorithm for IoT security
  122. Enhancing the Security, Reliability, and Data Integrity Issues in the Internet of Things by Implementing Blockchain Strategy in Mining: Challenges and Solutions
  123. A Survey on Various Security Issues for 5G Mobile Networks in WSN
  124. ProFuzzBench: A Benchmark for Stateful Protocol Fuzzing
  125. Cell Phone Security: User Awareness of Security Issues and Mobile Device Management
  126. Classifier for DDoS Attack Detection in Software Defined Networks
  127. Home Security Alarm Using Wemos D1 And HC-SR501 Sensor Based Telegram Notification
  128. A Survey on Cloud Computing Security Issues, Attacks and Countermeasures
  129. Prospects for Handling 5G Network Security: Challenges, Recommendations and Future Directions
  130. A flexible tool for estimating applications performance and energy consumption through static analysis
  131. Mobile and Cloud Computing Security
  132. Context-Aware Security for 6G Wireless The Role of Physical Layer Security
  133. Best ways computation intelligent of face cyber attacks
  134. A Systematic Survey on IoT Security Issues, Vulnerability and Open Challenges
  135. A Reward Based Formal Model for Distributed Software Defined Networks
  136. Ethereum smart contract security research: survey and future research opportunities
  137. Improving the Environmental Security of Urban Areas on the Basis of GIS and Web Technology
  138. Security and Trust in IoT Data Streams using Tangle Distributed Ledger and Node-RED Technology
  139. SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers
  140. Building Machine Learning Based Firewall on Spanning Tree Protocol over Software Defined Networking
  141. Security and Privacy in IOT
  142. Pest surveillance system for food security: A case study in the Philippines
  143. Design of Secure Coding Challenges for Cybersecurity Education in the Industry
  144. Understanding Factors Influencing Intention to Use E-government Services in Vietnam: Focused on Privacy and Security Concerns
  145. Security in Mobile Environments
  146. Awareness of Secure Coding Guidelines in the Industry–A first data analysis
  147. A Novel Method to Enhance Sustainable Systems Security in Cloud Computing Based on the Combination of Encryption and Data Mining
  148. Deep learning for security problems in 5G heterogeneous networks
  149. Data Security Using Cryptography & Steganography
  151. Use of Software on Modeling Hazardous Substance Release as a Support Tool for Crisis Management
  152. Operator action log based monitoring and control and its verification of nuclear power plants
  153. Software as a service, Semantic Web, and big data: Theories and applications
  154. Reduce Cyber Security Vulnerabilities: IaaS and Data
  155. A time-variant fault detection software reliability model
  156. Multimedia Security
  157. Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination
  158. Cloud Computing: Security Issues and Challenges
  159. Cloud Security Issues and Log-based Proactive Strategy
  160. Privacy and Security in Augmentation Technologies
  161. The Impact of Information and Communication Technology on Agricultural Systems and the Transition to Food Stability and Security (Case Study: Agricultural Jihad …
  162. Full-scene network security protection system based on ubiquitous power Internet of things
  163. Balancing Security: A Moving Target
  164. FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption
  165. Layer based security in narrow band Internet of Things (NB-IoT)
  166. ANT-Centric IoT Security Reference Architecture–Security-by-Design for Satellite-Enabled Smart Cities
  167. P4Fuzz: Compiler fuzzer for dependable programmable dataplanes
  168. Wireless Networks Between Security and Efficiency
  169. Fear of the unknown with healthcare IoT devices: An exploratory study
  170. Governing Uncertainty or Uncertain Governance? Information Security and the Challenge of Cutting Ties
  171. Awareness of Secure Coding Guidelines in the Industry–A first data analysis
  172. Digital Nuclear Leadership for Safety and Security-Towards Effective Regulatory Control
  173. Verification of Embedded Software Binaries using Virtual Prototypes
  174. Security and Intelligent Management for Fog/Edge Computing Resources
  175. An architecture to manage security operations for digital service chains
  176. Security of Short-Range Wireless Technologies and an Authentication Protocol for IoT
  177. SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution
  178. Vulnerabilities in Fog/Edge Computing from Architectural Perspectives
  179. A survey on blockchain for information systems management and security
  180. Model checking based unmanned aerial vehicle (UAV) security analysis
  181. The tacit dimension of expertise: Professional vision at work in airport security
  182. Security pre-warning system of underground pipelines based on BOTDR
  183. The risk of generating technical debt interest: a case study
  184. A systematic review and taxonomy of web applications threats
  185. Customer satisfaction with bank services: The role of cloud services, security, e-learning and service quality
  186. Construction of Perceptual Security Dataset for Video Selective Encryption Based on Double-Blind Subjective Experiment
  187. Efficient mobile security for E health care application in cloud for secure payment using key distribution
  188. The adopting factors of campus mobile software applications
  189. Optimization of security check efficiency in subway station based on Anylogic: A case study of Nanchang Metro
  190. Research on security situation assessment algorithm under virtual technology of cloud platform
  191. Architecture and security of SCADA systems: A review
  192. Options to Improve the General Model of Security Management in Private Bank with GDPR Compliance
  195. A Systematic Literature Review on Implementing Non-functional Requirements in Agile Software Development: Issues and Facilitating Practices
  196. Not All Branches Are Equal: An Improved QSYM Schema for Binary Vulnerability Mining
  197. Machine Learning based Malicious Payload Identification in Software-Defined Networking
  198. Safety and security of oil and gas pipeline transportation: A systematic analysis of research trends and future needs using WoS
  199. Data Security & Future Issues for Cloud Computing
  200. On the Requirements for Serious Games geared towards Software Developers in the Industry
  201. MSDN-GKM: Software Defined Networks Based Solution for Multicast Transmission with Group Key Management
  202. A Comprehensive Study of Privacy and Security Risk Awareness Among Mobile Internet Users for Social Networks Sites in Malaysia
  203. Digital Health or Internet of Things in Tele-Health: A Survey of Security Issues, Security Attacks, Sensors, Algorithms, Data Storage, Implementation Platforms, and …
  204. Exploiting Mixed Binaries
  205. Size, Speed, and Security: An Ed25519 Case Study.
  206. Maggie Dwyer and Thomas Molony (eds.), Social Media and Politics in Africa: Democracy, Censorship and Security
  207. Policing with the drone: Towards an aerial geopolitics of security
  208. Shifting traditional undergraduate software engineering instruction to a DevOps focus
  209. Text Mining for Secure Cyber Space
  210. Should Software Testing Continue After Release of a Software: A New Perspective
  211. Paillier Homomorphic Encryption with K-Means Clustering Algorithm (PHEKC) for Data Mining Security in Cloud
  212. Internet of Things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security and market opportunities
  213. Security Attacks and Defenses in Distributed Sensor Networks
  214. P2IDF: A Privacy-Preserving based Intrusion Detection Framework for Software Defined Internet of Things-Fog (SDIoT-Fog)
  215. Internet of Things: Architecture, Security Issues and Solutions
  216. Safety and Security in Knowledge Landscapes
  217. Book review: Malcolm N MacDonald and Duncan Hunter, The Discourse of Security: Language, Illiberalism and Governmentality
  218. FUZZOLIC: mixing fuzzing and concolic execution
  219. Fog/Cloud Service Scalability, Composition, Security, Privacy, and SLA Management
  220. Conceptual modeling of an IP phone communication system: A case study
  221. Analysis of the cost factors on E-government software cost using fuzzy decision making system
  222. Azure Security Center and Azure Sentinel
  223. Assessing dynamic China’s energy security: Based on functional data analysis
  224. Information and communication technologies in tourism
  225. Integrating Deep Reinforced Learning and Robotic Process Assessment in Blockchain Digital Transformation for Autonomous Cybersecurity
  226. Severity Prediction of Software Vulnerabilities Using Textual Data
  227. Security protocols analysis including various time parameters [J]
  228. Autonomic rejuvenation of cloud applications as a countermeasure to software anomalies
  229. IoT Security, Challenges, and Solutions: A Review
  230. Mobile Application Security Using Static and Dynamic Analysis
  231. Improving students’ problem-solving ability through the ‘information system security’project guided by the theory of inventive problem solving (TIPS)
  232. Cybersecurity for Automated Vehicles
  233. A Multi-Objective Hyper-Heuristic Improved Particle Swarm Optimization Based Configuration of SVM for Big Data Cyber Security
  234. Security in Brain-Computer Interfaces: State-of-the-Art, Opportunities, and Future Challenges
  235. Architecture of Proposed Secured Crypto-Hybrid Algorithm (SCHA) for Security and Privacy Issues in Data Mining
  236. Corner case data description and detection
  237. An Approach for Refining Non-Functional Software Architectures
  238. Digital Transformation, Cyber Security and Resilience of Modern Societies
  239. An Empirical Study on Usability and Security of E-Commerce Websites
  240. Smart Guns Don’t Kill People
  241. Azure Kubernetes Services: Container Security
  242. Vuldeelocator: a deep learning-based fine-grained vulnerability detector
  243. Cyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
  244. On Security and Data Integrity Framework for Cloud Computing Using Tamper-Proofing
  245. Development of a composite measure for mapping rural food and nutrition security: application and validation in the drought-prone Bundelkhand region of India
  246. Towards security-Aware 5G slice embedding
  247. Security Systems for Smart Cities Based on Acoustic Sensors and Machine Learning Applications
  248. Security Risks Of Sharing Content Based On Minors By Their Family Members On Social Media In Times Of Technology Interference
  249. Comparative Study of RSA with Optimized RSA to Enhance Security
  250. Security Issues in Cloud Computing
  251. Confluence of 4G LTE, 5G, Fog, and Cloud Computing and Understanding Security Issues
  252. Security Implementations in IoT Using Digital Signature
  253. Addressing Malware Attacks on Connected and Autonomous Vehicles: Recent Techniques and Challenges
  254. Network Security and Prevention of Accounting Information System in the Era of Big Data
  255. Risk model development for information security in organization environment based on business perspectives
  256. Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
  257. Active Security by Implementing Intrusion Detection and Facial Recognition
  258. Applied Machine Learning to Vehicle Security
  259. Beyond internal conflict: The emergent practice of climate security
  260. Application of internet of things information security in the informationization of sports training and education
  261. Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller
  262. High-current light-ion cyclotron for applications in nuclear security and radioisotope production
  263. Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
  264. Security-SLA-guaranteed service function chain deployment in cloud-fog computing networks
  265. Federated Learning Empowered End-Edge-Cloud Cooperation for 5G HetNet Security
  266. A clustering approach towards cross-project technical debt forecasting
  267. Principles of incident response and disaster recovery
  268. High-assurance cryptography in the spectre era
  269. Offensive Cyber Security Trainer for Platform Management Systems
  270. Design Patterns and Electric Vehicle Charging Software
  271. DCT & DWT based watermarking scheme for medical information security
  272. Can Blockchain Technology Enhance Security and Privacy in the Internet of Things?
  273. Aspects of Biometric Security in Internet of Things Devices
  274. Wireless and mobile device security
  275. Conversion to Remote Proctoring of an Online Language Placement Exam
  276. The Digital Economy, Cyber Security and Russian Criminal Law
  277. Low-rate DDoS attacks detection method using data compression and behavior divergence measurement
  278. Human security of urban migrant populations affected by length of residence and environmental hazards
  279. Ecological security evaluation of Panjin city on town scale
  280. Getting Started in Cryptography and Cryptanalysis
  281. Roles: From Objects, Security and Database Perspective
  282. An intelligent based healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks
  283. Artificial Intelligence Applications in Military Systems and Their Influence on Sense of Security of Citizens
  284. AHP integrated TOPSIS and VIKOR methods with Pythagorean fuzzy sets to prioritize risks in self-driving vehicles
  285. Security analysis of reversible logic cryptography design with LFSR key on 32-bit microcontroller
  286. The New Cryptographic Method for Software and Hardware Protection of Communication Channels in Open Environments
  287. Security system development for “Smart House”
  288. SDN-based cyber defense: A survey
  290. The International Security Alignment of Pacific Alliance’s Members with the United States: A Constructivist Realist Approach
  291. Safety Wing for Industry (SWI 2020)–An Advanced Unmanned Aerial Vehicle Design for Safety and Security Facility Management in Industries
  292. Security & Integrity in FHIR
  293. Privacy and Consent
  294. Systematic review and meta-analysis of global food security projections to 2050
  295. Android Malware Classification using Ensemble Classifiers
  296. Common Vulnerabilities Exposed in VPN–A Survey
  297. You shall not repackage! demystifying anti-repackaging on android
  298. Security-aware task scheduling with deadline constraints on heterogeneous hybrid clouds
  299. How to prepare for the onslaught of phishing email attacks
  300. A Comprehensive Study of IoT Security Risks in Building a Secure Smart City
  301. A Review on Cybersecurity Vulnerabilities for Urban Air Mobility
  302. Side Channel Assessment Platforms and Tools for Ubiquitous Systems
  303. Software Quality by Design Composition
  304. What we have here is failure to validate: Summer of LangSec
  305. Lightweight encryption technique to enhance medical image security on internet of medical things applications
  306. A state of art for smart gateways issues and modification
  307. Availability analysis of a permissioned blockchain with a lightweight consensus protocol
  308. A coupled human–natural system analysis of freshwater security under climate and population change
  309. An investigation of various applications and related security challenges of Internet of things
  310. Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems
  312. Investigative Techniques for the De-Anonymization of Hidden Services
  313. Formal Verification of a Merge Sort Algorithm in SPARK
  314. A data-driven approach for online dynamic security assessment with spatial-temporal dynamic visualization using random bits forest
  315. Joint encryption and compression-based watermarking technique for security of digital documents
  316. Jazz (Hardcopy or e-book, with Total Access Registration Card)
  317. Security Evaluation of Smart Contract-based On-chain Ethereum Wallets
  318. Parciv: recognizing physical activities having complex interclass variations using semantic data of smartphone
  319. Secure Coding Guidelines
  320. Design and implementation of partition Operating System based on ARINC653 standard
  321. What changes in where? an empirical study of bug-fixing change patterns
  322. A Survey Paper on Machine Learning Approaches to Intrusion Detection
  323. Image Information Security
  324. Firewall Scheduling and Routing Using pfSense
  325. PLATYPUS: Software-based power side-channel attacks on x86
  326. Understanding information security policy violation from a situational action perspective
  327. A Public Platform for Virtual IoT-Based Monitoring and Tracking of COVID-19
  328. Security in Amazon Web Services
  329. Risk dynamics modelling of reservoir dam break for safety control in the emergency response process
  330. Research on facial expression recognition of video stream based on OpenCV
  331. Physical-Layer Security Improvement with Reconfigurable Intelligent Surfaces for 6G Wireless Communication Systems
  332. Kids security on social networks by face blur technique
  333. Measuring IoT Security Issues and Control Home Lighting System by Android Application Using Arduino Uno and HC-05 Bluetooth Module
  334. Modular Secured IoT Using SHAKTI
  335. Comprehensive survey of big data mining approaches in cloud systems
  336. A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms
  337. Modified adaptive neuro fuzzy inference system based load balancing for virtual machine with security in cloud computing environment
  338. Quantitative simulation of the water-energy-food (WEF) security nexus in a local planning context in indonesia
  339. Migration of existing software systems to mobile computing platforms: a systematic mapping study
  340. DADEM: Distributed Attack Detection Model Based on Big Data Analytics for the Enhancement of the Security of Internet of Things (IoT)
  341. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system
  342. Description of a Network Attack Ontology Presented Formally
  343. The short-term effects of COVID-19 outbreak on dietary diversity and food security status of Iranian households (A case study in Tehran province)
  344. Cybersecurity of Railway Network Management and Partitioning
  346. IoT Security Architecture with TEA for DoS Attacks Prevention
  347. Testing of EFFTRAN and Angle software in comparison to GEANT 4 simulations in gamma spectrometry of cylindrical and noncylindrical sample geometries
  348. Performance Evaluation of VLSI Implemented WSN Algorithms
  349. Interactive Security of Ransomware with Heuristic Random Bit Generator
  350. Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey
  351. A Compact FPGA-Based Accelerator for Curve-Based Cryptography in Wireless Sensor Networks
  352. Security symptoms
  353. Digital forensics explained
  354. Privacy Preserving Anti-forensic Techniques
  355. Post-Soviet Estonia’s information safety: lessons for Ukraine
  356. Computing Research Challenges in Next Generation Wireless Networking
  357. A new approach for security of wireless sensor networks based on anti-synchronization of the fractional-order hyper-chaotic system
  358. Datensicherheit (Security)
  359. An Ensemble Deep Neural Network Model for Onion-Routed Traffic Detection to Boost Cloud Security
  360. Secure Data Sharing Framework Based on Supervised Machine Learning Detection System for Future SDN-Based Networks
  361. Towards sustainable development: risk management for organizational security
  362. Detection of DoS, DDoS Attacks in Software-Defined Networking
  363. Advance Security and Challenges with Intelligent IoT Devices
  364. A study on e-commuting: Alleviating technical and mobility threats in a BYOD-enabled banking environment in Nigeria
  365. A Framework for Systematic Classification of Assets for Security Testing
  366. Mapping coercive institutions: The state security forces dataset, 1960–2010
  367. A Survey of Intelligent Techniques for Android Malware Detection
  368. The Agent Web Model: modeling web hacking for reinforcement learning
  369. As developing of Internet and Intranet Web browser-related application escalates, it is critical that the software engineers have complete logical models of …
  370. Integrated framework for incorporating sustainability design in software engineering life-cycle: An empirical study
  371. Towards a Robust and Trustworthy Machine Learning System Development
  372. Formalizing Open Source Software Quality Assurance Model by Identifying Common Features from Open Source Software Projects
  373. Source redundancy management and host intrusion detection in wireless sensor networks
  374. A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19
  375. Intelligent Cyber Defense in 5G Augmented Aviation Cybersecurity Framework
  376. nEnhancing Employees Information Security Awareness in Private and Public Organisations: A Systematic Literature Review
  377. The COVID-19 test of the United Nations Security Council
  378. Analysis of Ransomware, Methodologies Used by Attackers and Mitigation Techniques
  379. Fortifying Vehicular Security Through Low Overhead Physically Unclonable Functions
  380. Shopping for social security law in the EU
  381. A blockchain-based code copyright management system
  382. BuildCOM: automated auditing and continuous commissioning of next generation building management systems
  383. Livelihood Options and Livelihood Security Among Tribal in South Western Plateau and Highland Region in West Bengal
  384. Security and Privacy for Healthcare Blockchains
  385. Analysis of Inappropriate Usage of Cryptographic Primitives in Indian Mobile Financial Applications
  386. Multi-Language Spam/Phishing Classification by Email Body Text: Toward Automated Security Incident Investigation
  387. Barriers to drinking water security in rural Ghana: The vulnerability of people with disabilities
  388. Crosstalk: Speculative data leaks across cores are real
  389. Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems
  390. A preference-based approach to incorporate the” voice of the customer” in mass-market software product design
  391. Survey of Cryptography Algorithms for Sub-Saharan Countries
  392. Decentralized Actionable Cyber Threat Intelligence for Networks and the Internet of Things
  393. Impact of coronavirus pandemic crisis on technologies and cloud computing applications
  395. Online Voting System Using Blockchain
  396. How Artificial Intelligence Can Undermine Security: An Overview of the Intellectual Property Rights and Legal Problems Involved
  397. Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing
  398. Multiobjective Placement for Secure and Dependable Smart Industrial Environments
  399. End-to-End Data Architecture Considerations for IoT
  400. Security and Privacy in FinTech: A Policy Enforcement Framework
  401. Food Security Status among US Older Adults: Functional Limitations Matter
  402. Cryptographic Backdoors
  403. Machine learning for network application security: Empirical evaluation and optimization
  404. The role of attachment security in error self-monitoring: Is a social component necessary?
  405. Safety and security concerns at the beach: Views of migrant visitors in Ghana
  406. How Quantum Computers threat security of PKIs and thus eIDs
  407. Security Concerns and Privacy Preservation in Blockchain based IoT Systems: Opportunities and Challenges
  408. A critical Analysis of Cyber Security and Resilience in Nigeria
  409. Private military and security companies’ logos: Between camouflaging and corporate socialization
  410. Internet of things and ransomware: Evolution, mitigation and prevention
  411. Quantum Theory from Principles, Quantum Software from Diagrams
  412. Asset Security in Data of Internet of Things Using Blockchain Technology
  413. Integration of Blockchain and Remote Database Access Protocol-Based Database
  414. Knowledge Sharing Behavior in Homeland Security-The Roles of Trust, Technology, and Expectations
  415. Intelligent Security Performance Prediction for IoT-Enabled Healthcare Networks Using Improved CNN
  416. Security Information and Event Management Model Based on Defense-in-Depth Strategy for Vital Digital Assets in Nuclear Facilities
  417. An Inward Focus of Attention During Information Security Decision Making: Electrophysiological Evidence
  418. PROLISEAN: A New Security Protocol for Programmable Matter
  419. A systematic comparison of mobile Ad-hoc network security attacks
  420. Physical layer security: Authentication, integrity, and confidentiality
  421. Industrial Internet Development Strategies and Innovative Practices for Large Energy Corporation
  422. A systematic literature review on federated machine learning: From a software engineering perspective
  423. MUP: Simplifying Secure Over-The-Air Update with MQTT for Constrained IoT Devices
  424. Managing and Maintaining TYPO3
  425. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs
  426. Light-Weight Key Establishment Mechanism for Secure Communication Between IoT Devices and Cloud
  427. Blockchain-Based Security Services for Fog Computing
  428. The phishing funnel model: A design artifact to predict user susceptibility to phishing websites
  429. ProDB: A memory-secure database using hardware enclave and practical oblivious RAM
  430. Security and Privacy Techniques in IoT Environment
  431. A Sharding Scheme based Many-objective Optimization Algorithm for Enhancing Security in Blockchain-enabled Industrial Internet of Things
  432. Motion detection using Passive Infrared Sensor using IoT
  433. A Novel Mechanism for Fraud Rank Detection in Social Networks
  434. Generating Informative CVE Description From ExploitDB Posts by Extractive Summarization
  435. Linux Software Encyclopedia
  436. Study on Security and Privacy of E-Government Service
  437. Securing Microservices on Cloud
  438. The ethical consequences of “going dark”
  439. Healthcare cyber-attacks and the COVID-19 pandemic: an urgent threat to global health
  441. Onlooker effect and affective responses in information security violation mitigation
  442. Discovery and Deterrence of Black Hole Attack in Clustering Ad Hoc Networks Based on Software Agents
  443. SoK: Computer-aided cryptography
  444. PACStack: an Authenticated Call Stack
  445. Predicting security events using attention neural network
  446. Changing attitudes towards teletherapy in Austrian therapists during the COVID-19 pandemic
  447. Utilizing Data Analytics in the Field of Physical Security: An Exploratory Study
  448. FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications
  449. Research on Informatization Construction of Electric Power Communication Network under Smart Grid
  450. Security and Privacy of E-health Data
  451. Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers
  452. Blockchain-as-a-Service
  453. The adoption of homeland security initiatives in Texas police departments: A contextual perspective
  454. Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce
  455. Cryptanalysis Attacks and Techniques
  456. CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory
  457. Risk, safety and security among visitors to Istanbul
  458. The Criminalisation of Tools Under the Computer Misuse Act 1990. The Need to Rethink Cybercrime Offences to Effectively Protect Legitimate Activities and Deter …
  459. Land Grab Practices and a Threat to Livelihood and Food Security in India? A Case Study from Aerocity Expansion Project from SAS Nagar, Punjab
  460. Research on intelligent operation and maintenance management method of enterprise IT
  461. Techniques Behind Smart Home Automation System Using NLP and IoT
  462. A system of quantities from software metrology
  463. Database Security Enhancement by Eliminating the Redundant and Incorrect Spelled Data Entries
  464. A Method for Assessing Threats to the Economic Security of a Region: A Case Study of Public Procurement in Russia
  465. How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit
  466. Design of a reference architecture for developing smart warehouses in industry 4.0
  467. Is food security an illusion for cities? A system dynamics approach to assess disturbance in the urban food supply chain during pandemics
  468. A leverage points perspective on institutions for food security in a smallholder-dominated landscape in southwestern Ethiopia
  469. Influence of precaution and dynamic post-indemnity based insurance policy on controlling the propagation of epidemic security risks in networks
  470. The HPCMP CREATE ™ Program management Model-Part I
  471. Classifying Common Vulnerabilities and Exposures Database Using Text Mining and Graph Theoretical Analysis
  472. Recent advances on industrial data-driven energy savings: Digital twins and infrastructures
  473. Cybersicherheit für automatisierte Fahrzeuge
  474. Efficient Data Security Using Hybrid Cryptography on Cloud Computing
  475. Creating a sense of digital privacy in the private sector
  476. The Current State of the Investment Environment in Ukraine and its Impact on the Investment Security of the State
  477. A New Paradigm for Outpatient Diagnosis and Treatment of Lower Urinary Tract Symptoms Utilizing a Mobile App/Software Platform and Remote and In-Office Visits: A …
  478. A leverage points perspective on institutions for food security in a smallholder-dominated landscape in southwestern Ethiopia
  479. A systematic literature review on technical debt prioritization: Strategies, processes, factors, and tools
  480. The Systemic Approach for Estimating and Strategizing Energy Security: The Case of Ukraine
  481. Industry 4.0 Interoperability, Analytics, Security, and Case Studies
  482. Task offloading for wireless VR-enabled medical treatment with blockchain security using collective reinforcement learning
  483. Farmland Fragmentation, Farmland Consolidation and Food Security: Relationships, Research Lapses and Future Perspectives
  484. The Effects of Needs for Security and Certainty on Economic Beliefs: The Role of Political Engagement and the Welfare State Model
  485. Security of 3D-printed polylactide acid piece sterilization in the operating room: a sterility test
  486. An Authenticated E-Voting System Using Biometrics and Blockchain
  487. The security field: Forming and expanding a Bourdieusian criminology
  488. 4 Cloud Security
  489. Characteristics associated with changes in food security status among college students during the COVID-19 pandemic
  490. A Framework for the Attack Tolerance of Cloud Applications Based on Web Services
  491. The role of data and information security governance in protecting public sector data and information assets in national government in South Africa
  492. Processing tweets for cybersecurity threat awareness
  493. Critical success factors to create 5G networks in the smart cities of India from the security and privacy perspectives
  494. Edge-based auditing method for data security in resource-constrained internet of things
  495. Technique for Enhancing the Robustness, Imperceptibility, and the Security of Digital Audio Watermarking
  496. Theft Security System for Automatic Teller Machines Using IoT
  497. Conceptual Framework for Deploying IoT in Digital Libraries: A systematic review of the entries
  498. Strengthening Pix CAPTCHA Using Trainlm Function in Backpropagation
  499. The Balance Between Security, Privacy and Data Protection in IoT Data Sharing: a Critique to Traditional” Security&Privacy” Surveys
  500. SecCAN: A Practical Secure Control Area Network for Automobiles
  501. A Multiobjective Model for Analysis of the Relationships between Military Expenditures, Security, and Human Development in NATO Countries
  502. A randomized controlled trial of three school meals and weekend food backpacks on food security in Virginia
  503. Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms
  504. SPD-Safe: Secure Administration of Railway Intelligent Transportation Systems
  505. Study of environmentally sustainable security in wireless sensor networks
  506. My SQL Bible
  507. Integrating the MCR and DOI models to construct an ecological security network for the urban agglomeration around Poyang Lake, China
  508. Giving semantics to program-counter labels via secure effects
  509. Conditioned integration during security crises: the role of Israeli sports media from 1996 to 2014
  510. Design network intrusion detection system using support vector machine
  511. Researching on AES Algorithm Based on Software Reverse Engineering
  512. Application Analysis of Artificial Intelligence in Library Network Security
  513. A low area VLSI implementation of extended tiny encryption algorithm using Lorenz chaotic system
  514. Mapping groundwater recharge in Africa from ground observations and implications for water security
  515. Study on Agent Architecture for Context-Aware Services
  516. User-Cell Association for Security and Energy Efficiency in Ultra-Dense Heterogeneous Networks
  517. Elderly’s food security and its associated socioeconomic determinants in Tehran: A cross-sectional study
  518. A Multi-Disciplinary Analysis of Catholic Social Teaching with Implications for Engineering and Technology
  519. PoC Testing Analysis of Big Data Products
  520. Enforcing situation-aware access control to build malware-resilient file systems
  521. Real-Time Human Locator and Advance Home Security Appliances
  522. SoK: Security and Privacy in the Age of Commercial Drones
  523. Countering Malicious Small Unmanned Aerial Systems: Understanding the Problem for Border Security
  524. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109
  525. A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
  526. Verilog Implementation of Biometric-Based Transmission of Fused Images Using Data Encryption Standards Algorithm
  527. Seismic performance evaluation of multi-story CBFs equipped with SMA-friction damping braces
  528. Exploring a Novel Strategy for Detecting Cyber-Attack by Using Soft Computing Technique: A Review
  529. Design Patterns and Best Practices
  530. The Contribution of Cereal Grains to Food Security and Sustainability in Africa: Potential Application of UAV in Ghana, Nigeria, Uganda, and Namibia
  531. Kandidatens navn: Jostein Tveit
  532. A review of 80 assessment tools measuring water security
  533. Data Security and Privacy Functions in Fog Computing for Healthcare 4.0
  534. Secure Server Virtualization Using Object Level Permission Model
  535. A Forecasting-Based DLP Approach for Data Security
  536. SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
  537. Domain-Specific IoT Applications
  538. Breaking Down and Reduplication of Information in Cloud for Best Overall Performance and Protection
  539. Malicious Traffic Classifier in android using Neural Networks
  540. SANS Institute
  541. Small States and the New Security Environment
  542. Access Control of Door and Home Security System
  543. Overview of the Security. Cryptography Namespace
  544. Deciding accuracy of differential privacy schemes
  545. Docker Security Analysis Mechanism with Linux Platform
  546. A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly
  547. Cloud Computing based Intelligent Bank Locker System
  548. Social Security, Medicare & Government Pensions: Get the Most Out of Your Retirement and Medical Benefits
  549. Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions
  551. COVID-19 pandemic cybersecurity issues
  552. Dealing With COVID-19 Network Traffic Spikes [Cybercrime and Forensics]
  553. Reduce Cyber Security Vulnerabilities: Identity Layer
  554. SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks
  555. Mitigating Cloud Computing Cybersecurity Risks Using Machine Learning Techniques
  556. A Quantum Leap in Microgrids Security: The Prospects of Quantum-Secure Microgrids
  557. 6G security challenges and potential solutions
  558. Application of ecosystem service flows model in water security assessment: A case study in Weihe River Basin, China
  559. A Study on Security Services and Threats in Cloud Computing
  560. Brightness attenuation mechanisms of Er3+ self-sensitized upconversion nanocrystals under 1.5 µm pumping
  561. Emerging ICT applications and services—Big data, IoT, and cloud computing
  562. Cybersecurity and the Digital-Health: The Challenge of This Millennium
  563. The architecture of computer hardware, systems software, and networking: An information technology approach
  564. Enabling data security in data using vertical split with parallel feature selection using meta heuristic algorithms
  565. Understanding employees’ information security identities: an interpretive narrative approach
  566. Developing a Blockchain-Based and Distributed Database-Oriented Multi-malware Detection Engine
  567. Making the Internet of Things Sustainable: An Evidence Based Practical Approach in Finding Solutions for yet to Be Discussed Challenges in the Internet of Things
  568. A Novel Study on Multinomial Classification of x86/x64 Linux ELF Malware Types and Families Through Deep Neural Networks
  569. The “human factor” in cybersecurity: Exploring the accidental insider
  570. Optical network security management: requirements, architecture, and efficient machine learning models for detection of evolving threats
  571. Challenges in Firmware Re-Hosting, Emulation, and Analysis
  572. Door Security System Using e-KTP RFID Reading and Passive Infrared Sensor
  573. The Anti-Mercenary Norm and United Nations’ Use of Private Military and Security Companies: From Norm Entrepreneurship to Organized Hypocrisy
  574. Mlcapsule: Guarded offline deployment of machine learning as a service
  575. IoT Based Smart Farming Using Thingspeak and MATLAB
  576. Trusted Cooperative E-Learning Service Deployment Model in Multi-Cloud Environment
  577. Redefining deterrence in cyberspace: Private sector contribution to national strategies of cyber deterrence
  579. Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities
  580. Sealing Porous Media through Calcium Silicate Reactions with CO2 to Enhance the Security of Geologic Carbon Sequestration
  581. Autonomous mitigation of cyber risks in the Cyber–Physical Systems
  582. Smart Contract Languages: A Multivocal Mapping Study
  583. Development of Smart U-Health Care Systems
  584. The Eco-label Blue Angel for Software—Development and Components
  585. Research on the game of network security attack-defense confrontation through the optimal defense strategy
  586. A Survey of Cyber Threats and Security Controls Analysis for Urban Air Mobility Environments
  587. A Systematic Review of Multimedia Tools for Cybersecurity Awareness and Education
  589. Guarding the Gate
  590. Risk assessment of business models driven by Industry 4.0
  591. Study and Analysis of Test Case Prioritization Technique
  592. Hardware Trojan Attack in Embedded Memory
  593. Lightweight Cryptography Algorithms for Internet of Things enabled Networks: An Overview
  594. Espousal of Industry 4.0 in Indian manufacturing organizations: Analysis of enablers
  595. Small and Medium-Sized Enterprises in Rural Areas of the Czech Republic and Their Approach to Management Auditing
  596. The Social Life of the Women, Peace and Security Agenda: A Digital Social Network Analysis
  597. Digitalization and decentralization driving transactive energy Internet: Key technologies and infrastructures
  598. Optimal Investment in Cyber-Security under Cyber Insurance for a Multi-Branch Firm
  599. Carbon and Nitrogen Footprints Management for Environmental and Food Security
  600. The role of the project manager in agile software development projects
  601. Security Analysis of SIMON32/64 Based on Deep Learning
  602. BAA Number: BAA98-02 Proposed Integration Role: RESEARCH OPERATING SYSTEMS
  603. Research and Application of Multipath Network Time Service System
  604. The Vehicle Model as a Controlled System
  605. Cloud Computing: Considering Trust as Part of the User Quality of Experience
  606. Is Machine Learning Software Just Software: A Maintainability View
  607. 2020 30th International Telecommunication Networks and Applications Conference (ITNAC) Technical Program Committee Welcome
  608. A novel hyperchaotic image encryption system based on particle swarm optimization algorithm and cellular automata
  609. Systematic Literature Review: Research Collaboration and Social Software
  610. Cybersecurity of Industrial Cyber-Physical Systems: A Review
  611. Quality Assurance for AI-Based Systems: Overview and Challenges (Introduction to Interactive Session)
  612. On the Optimal Lawful Intercept Access Points Placement Problem in Hybrid Software-Defined Networks
  613. An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
  614. SDNStat-Sec: A Statistical Defense Mechanism Against DDoS Attacks in SDN-Based VANET
  615. A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware
  616. SEAPP: A secure application management framework based on REST API access control in SDN-enabled cloud environment
  617. Buying behaviour model of early adopting organizations of radical software innovations
  618. Resource allocation and trust computing for blockchain-enabled edge computing system
  619. Modelling security risk scenarios using subjective attack trees
  620. A unifying type-theory for higher-order (amortized) cost analysis
  621. A cluster randomized controlled trial of a home-delivered food box on food security in Chickasaw Nation
  622. New Features in C++ 20
  623. Demographic considerations and food security in Nigeria
  624. Secure and Scalable Collection of Biomedical Data for Machine Learning Applications
  625. A Product Pain-Pleasure Framework for Software Product Design in the Usability and User Experience Domains
  626. Impact of Coordination, Psychological Safety, and Job Security on Employees’ Performance: The Moderating Role of Coercive Pressure. Sustainability 2021, 13 …
  627. Assessment of Land Ecological Security and Analysis of Influencing Factors in Chaohu Lake Basin, China from 1998–2018
  628. Biden, National Security and Global Trade: Less Subterfuge and More Strategy in the Era of Crisis.
  629. Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids
  630. Sustainable value co-creation at the Bottom of the Pyramid: using mobile applications to reduce food waste and improve food security
  631. Emerging tools and paradigm shift of gene editing in cereals, fruits, and horticultural crops for enhancing nutritional value and food security
  632. Technology intervention to support caregiving for Alzheimer’s disease (I-CARE): study protocol for a randomized controlled pilot trial
  633. New opportunities in common security and defence policy: Joining PESCO
  634. Catalog and Illustrative Examples of Lightweight Cryptographic Primitives
  635. Empirical analysis of transaction malleability within blockchain-based e-Voting
  636. The blockchain random neural network for cybersecure IoT and 5G infrastructure in smart cities
  637. Neurolaw: Advances in Neuroscience, Justice & Security
  638. Requirements capture and comparative analysis of open source versus proprietary service oriented architecture
  639. Implementation of a Hierarchical Embedded Cyber Attack Detection system for sUAS Flight Control Systems
  640. Development and Performance Testing of the Automated Building Energy Management System with IoT (ABEMS-IoT) Case Study: Big-Scale Automobile Factory
  641. Vancomycin Advanced Therapeutic Drug Monitoring: Exercise in Futility or Virtuous Endeavor to Improve Drug Efficacy and Safety?
  642. Security perception and people well-being
  643. Quantifying Uncertainty in Food Security Modeling
  644. Deep Learning-Based Logging Recommendation Using Merged Code Representation
  645. RAP Model—Enabling Cross-Layer Analysis and Optimization for System-on-Chip Resilience
  646. NATO’s evolving cyber security policy and strategy
  647. BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature
  648. Searchable Encryption
  649. Sustainable Management of IT Enterprises
  650. A comprehensive study of bloated dependencies in the maven ecosystem
  651. A randomized controlled trial measuring effects of extra Supplemental Nutrition Assistance Program (SNAP) benefits on child food security in low-income …
  652. Advances of ECG Sensors from Hardware, Software and Format Interoperability Perspectives
  653. Multilayer Self-Defense System to Protect Enterprise Cloud
  654. Faster and Secured Web Services Communication Using Modified IDEA and Custom-Level Security
  655. Designated-ciphertext searchable encryption
  656. Securing Biometric Framework with Cryptanalysis
  657. Data Visualization of 5G Speed Test Platform Using Tableau
  658. Enhanced IoV Security Network by Using Blockchain Governance Game
  659. Performance of deep learning vs machine learning in plant leaf disease detection
  660. Exploring role of moral disengagement and counterproductive work behaviours in information security awareness.
  661. A qualitative study of bereaved family caregivers: feeling of security, facilitators and barriers for rural home care and death for persons with advanced cancer
  662. Kubernetes Realizes the Cloud & Network Cooperation Based on Hardware SDN Controller
  663. Contribution of cassava and cassava-based products to food and nutrition security in Migori County, Kenya.
  664. A Novel Optimal Selection Algorithm for Agricultural Trade Export in Blockchain-Enabled Internet of Things
  665. Cloud Computing: The New World of Technology
  666. Multi-Perspectives of Cloud Computing Service Adoption Quality and Risks in Higher Education
  667. Networked Systems
  668. Customizing Health Security Preparedness Activities in Sub-Saharan Africa: Leveraging Political Context to Enhance IHR Implementation
  669. Optimal power flow with security operation region
  670. Process Changes
  671. Mobile Radio Communications and 5G Networks
  673. Vulnerability Assessment, Risk, and Challenges Associated with Automated Vehicles Based on Artificial Intelligence
  674. Regional Water Security
  675. Smart Power: The Global Competition for Cyber power and Capabilities
  676. Biosensor and Healthcare Vis-à-Vis Cloud Computing and IoT: Towards Sophisticated Healthcare Development—An Overview
  677. A Novel Discrete Firefly Algorithm for Constrained Multi-Objective Software Reliability Assessment of Digital Relay
  678. Consumer privacy during (and after) the COVID-19 pandemic
  679. A Neural Lyapunov Approach to Transient Stability Assessment in Interconnected Microgrids
  680. [TXT][TXT] New York, New York, July 1995
  681. Presenting a Model of Customer Experience Management in Mobile Banking Industry for Commercial Banks Customers in Dubai
  682. Detecting DDoS Attacks in IoT Environment
  683. Ferry Node Identification Model for the Security of Mobile Ad Hoc Network
  685. Empirical assessment of generating adversarial configurations for software product lines
  686. Security proof of practical quantum key distribution with detection-efficiency mismatch
  687. Optimal Artificial Neural Network Type Selection Method for Usage in Smart House Systems
  688. Digital Signature Authentication for a Bank Using Asymmetric Key Cryptography Algorithm and Token Based Encryption
  689. Learning to solve large-scale security-constrained unit commitment problems
  690. The Daily Life of Software Engineers during the COVID-19 Pandemic
  691. COSTE: Complexity-based OverSampling TEchnique to alleviate the class imbalance problem in software defect prediction
  692. A Physical Layer Security Enhancement Scheme under the Ambient Backscatter System
  693. The dual-use security dilemma and the social construction of insecurity
  694. Big Data for Smart Cities: A Case Study of NEOM City, Saudi Arabia
  695. Assessment of Land Ecological Security and Analysis of Influencing Factors in Chaohu Lake Basin, China from 1998–2018. Sustainability 2021, 13, 358
  696. Lattice-based Key-sharing Schemes: A Survey
  697. The Fundamentals and Potential for Cybersecurity of Big Data in the Modern World
  698. Pedagogías emergentes en ambientes virtuales de aprendizaje
  699. Challenges and opportunities in biometric security: A survey
  700. Review analysis on cloud computing based smart grid technology in the oil pipeline sensor network system
  701. Sustainability responses to climate-smart adaptation in Africa: implication for food security among farm households in the Central Region of Ghana
  702. A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security
  703. A novel Dual-Blockchained structure for contract-theoretic LoRa-based information systems
  704. Smartphone Traffic Analysis: A Contemporary Survey of the State-of-the-Art
  705. Security Analysis and Protection for Charging Protocol of Smart Charging Pile
  706. Security region-based laminar flow coordinated optimization of grids
  707. Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction
  708. Android application behavioural analysis for data leakage
  709. Optimisation of cyber insurance coverage with selection of cost effective security controls.
  710. Blockchain-based authentication and authorization for smart city applications
  711. What matters for financial inclusions? Evidence from emerging economy
  712. Quantifying Uncertainty in Food Security Modeling. Agriculture 2021, 11, 33
  713. Security analysis and improvement of a quantum multi-signature protocol
  714. Opportunities and challenges in the collection and analysis of digital phenotyping data
  715. Exploiting If This Then That and Usage Control obligations for Smart Home security and management
  716. Advanced Key Management System (AKMS) for Security in Public Clouds
  717. CryptDICE: Distributed data protection system for secure cloud data storage and computation
  718. IoT and Cloud computing issues, challenges and opportunities: A review
  719. Attacks and Security Measures in Wireless Sensor Network
  720. Information support for crop production automation in Russia and Belarus
  721. Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers
  722. Analysis of Work Efficiency and Quality of Software Maintenance Using Cross-Company Dataset
  723. Advances of ECG Sensors from Hardware, Software and Format Interoperability Perspectives. Electronics 2021, 10, 105
  724. Lost in Zero Space–An Empirical Comparison of 0. yz Releases in Software Package Distributions
  725. Implementation of Real-Time Virtual Dressing Room Using Microsoft Kinect SDK and Supervised Learning
  726. Getting Started with Cryptanalysis
  727. Realization of Business Intelligence using Machine Learning
  728. A New Approach on Advanced Encryption Standards to Improve the Secrecy and Speed Using Nonlinear Output Feedback Mode
  729. A Robust Neutrosophic Modeling and Optimization Approach for Integrated Energy-Food-Water Security Nexus Management under Uncertainty
  730. ACPAR: A framework for linking national water and food security management with global conditions
  731. Cross-domain single sign-on authentication of information security in network environment
  732. Enabling Technologies for Fog Computing in Healthcare 4.0: Challenges and Future Implications
  733. Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
  734. Food availability and food and nutrition (in) security of families providing for the National School Feeding Program/A disponibilidade de alimentos ea (in) seguranca …
  735. Model-driven environment for configuration control and deployment of on-board satellite software
  736. Review of Artificial Intelligence Cyber Threat Assessment Techniques for Increased System Survivability
  737. The globalization of artificial intelligence: consequences for the politics of environmentalism
  738. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks
  739. Design and Implementation of Health Management for Modular Spacecraft Avionics System
  740. POSMASWEB: Paranoid Operating System Methodology for Anonymous and Secure Web Browsing
  741. A Secure Data Sharing Using IDSS CP-ABE in Cloud Storage
  742. Toward a Knowledge-Based Model to Fight Against Cybercrime Within Big Data Environments: A Set of Key Questions to Introduce the Topic
  743. Performance Comparison of Various Techniques for Secure Data Communication in VANET
  744. Internet of Things System Using the Raspberry Pi to Monitor a Small-Scale Server Room
  746. Secure key-alternating Feistel ciphers without key schedule
  747. Safety, ISO 26262
  748. Within-person associations between attachment security, need satisfaction and psychological adjustment in daily life of older adults
  749. Flow length and size distributions in campus Internet traffic
  750. The AIQ meta-testbed: pragmatically bridging academic AI testing and industrial Q needs

Computer Science Research Topics – MS PhD

Add a Comment